Great Tech Resources!

20, Jul 2022
Get familiar with Whitelisting and Blacklisting

In this article, we will focus on one really interesting topic, which is Whitelisting and Blacklisting. First, we will explain what Whitelisting is and then what Blacklisting is. Finally, we will make a comparison between them. So, let’s start.

Whitelisting: Definition

Whitelisting is compiling a list of dependable programs or websites that are authorized to run and function on the network. When whitelisting, the default behavior is to either deny access to all other apps or to infer that any applications not on the list pose a security risk. Those apps that aren’t on the list need to gain your trust before they can access the network.

Some network managers prefer allowlisting because it offers a high level of protection by default. However, it can also be quite simple and quick just to grant access to a small selection of reliable applications while blocking all others.

What is Blacklisting?

The reverse of whitelisting is blacklisting. A denylist notifies the server that a particular website or email is hazardous in the eyes of the healthcare expert. On a denylist, any website or email address is not retrieved or received. Never is the existence of an email on a blacklist disclosed to the email sender or website host.

Additionally, Blacklisting is a technique for limiting the access that denies those entities that were added to the denylist access to a network or system based on their distinctive identifier, which is typically their distinct IP addresses.

Blacklisting is the process of denying access to an object to ALL entities that have been put on the BLACKLIST.

Whitelisting and Blacklisting – Main differences

  • While Allowlisting is focused on building trust, Denylisting is threat-focused.
  • While Whitelisting allows access to individuals on its list, Blacklisting restricts access for those on its list.
  • While the default is forbidden when using Allowlisting, it is permitted when using Denylisting.
  • If we are talking about a massive network with several variables, denylisting and safelisting may be challenging to maintain.

What are Whitelisting and Blacklisting across devices?

  • In routers

Through your Black List or your White List under Access Control, you can prevent or let a particular client device from connecting to your network (wired or wirelessly).

  • In Firewalls

Choose Firewall from the menu bar to stop unauthorized users from using your computer. Ensure that Access Control is active. IP addresses can be blocked by adding them to a whitelist or blacklist. Enter the IP address you want to allow access to or restrict access to in the Address New text box after choosing the IP address.

  • In websites

By editing the .htaccess file on your server, you can whitelist or blacklist any IP addresses you want.

If you want to allowlist IP: 

order deny,allow
deny from all
allow from <your ip>

If you want to blacklist an IP address:

Deny from <your ip>

If you blacklist an IP address with .htaccess, the blocked IP will receive a 403 Forbidden HTTP status code when visiting your website.

Recommended article: Monitoring service: Why is it important?

Conclusion

If you are particular about the identity of your bad actor, Blacklisting is a good strategy. It can be included on the list, keeping you safe until a new one appears. Although whitelisting is more drastic, its default practice of refusing access is frequently safer.

7, Jun 2022
What is Shared Hosting?

Shared Hosting: Definition

Shared hosting is a form of web hosting service in which multiple websites coexist on a single Internet-connected server. Your website will not be the only one stored on the server if you choose shared hosting. However, the server’s resources (RAM, processor, bandwidth, disk space, and so on) will be shared with the other websites housed there.

It’s a fairly popular web hosting option. Nevertheless, others may consider it to be too basic, but this is dependent on the demands of each website. There are currently great suppliers who can give dependable service, and you can get as comprehensive a package as your budget will allow.

How does it work?

When you construct a webpage, you must save all of the data that make it up, such as scripts, themes, text, photographs, and videos, on a server that is connected to the Network. That’s the only way for everyone else to see it.

Shared hosting distributes the resources of a single server to hundreds or even thousands of clients. This means that all of those customers share the server’s technical resources and maintenance costs. As a result, it is a very cost-effective option.

Why is Shared Hosting beneficial?

Shared Hosting is really advantageous. Here are some of its main benefits:

  1. Cost-efficient. The expense of sharing the server’s space and resources with other websites is also shared. In general, a basic plan for this service costs between $3 and $10 per month. Although initial costs may appear to be extremely low, always double-check regular prices before signing a contract. After the first year, the initial cost may increase or even triple.
  2. User-friendly. Not only can you set it up, but you can also manage its functions with only a few clicks. To administer it, you don’t need to be a skilled developer. If you are, you will undoubtedly be able to make the most of each of its features.
  3. You are not responsible for maintenance. For some budgets, the time and cost of technical upkeep can be prohibitive. That is a task that your provider is in charge of. It is not a little benefit to assist you in preventing and resolving problems.
  4. Built-in features make managing the website a breeze. cPanel, DNS administration, and a slew of other utilities make it simple.
  5. Customer service. The majority of shared hosting companies provide you with rudimentary customer service. Support can be basic or advanced, depending on the company you choose, its quality, plans, and so on.

Conclusion

Shared web hosting is a wonderful place to start, especially if you have a static site, a start-up, a blog, a corporate site, or something similar. It is a cost-effective and simple-to-manage option.

Choose shared web hosting only if it is the best option for your website. If your site requires more resources and you choose shared hosting, you will almost certainly run into issues.

31, Mar 2022
What is the purpose of Dynamic DNS?

Have you ever heard about Dynamic DNS? It is an absolutely incredible service. Why? Because it lets you connect to your gadgets over the Internet using a simple domain name. In our article, we will take a detailed look at it, how it functions and why it is so beneficial.

Dynamic DNS – what does it mean? 

Dynamic DNS (DDNS) stands for Dynamic Domain Name System. It’s a great way to update your name server automatically and regularly. Whenever they change, it changes IP addresses and their related A (IPv4) and AAAA (IPv6) records. It saves you the time and effort of manually doing this process.

Client IP addresses are continually changing at Internet service providers (ISPs). As a result, they face a significant problem in managing them so that they do not run out. Every device that connects to its network needs its IP address.

Perhaps you are unaffected by these frequent IP changes as a typical home Internet user. Businesses, on the other hand, are a different matter. If a company provides a service -or numerous services- over the Internet, such IP address changes will almost certainly harm its servers. In addition, every update increases the possibility that users requesting the service will be denied access because they are using an old, invalid IP address.

How does it work?

Dynamic DNS continuously monitors IP addresses for changes. When a change occurs, the DDNS automatically updates the new IP address.

Consider sharing service from a server that is connected to the Internet. It must also be connected to the internal network, and it will use a network address translation (NAT) router to communicate with the Internet. This NAT router assigns an internal IP address to the server. Then it must enable its external availability via port forwarding and obtaining a Portex (external port) and an Ipex (internal port) (external IP address). Your service will already be visible at this stage. Users will have easy access to it over the Internet.

Why is it advantageous?

The following are some of the benefits that DDNS can provide:

  • Dynamic DNS is a low-cost alternative. There are both commercial and free DDNS providers available. It is, nevertheless, less expensive than purchasing static IP addresses for your company’s equipment.
  • Access to your server or website without interruption. It makes no difference if your IP address changes. Your website will be accessible to your visitors.
  • A basic and straightforward method. All you have to do now is sign up for the service, and the program will be installed automatically. Ready!
  • You’ll get notified in real time if the DNS server’s IP address changes.
  • Remote access or VPN connection is seamless and straightforward for employees who work from home.
  • Installing security cameras will necessitate a strong and consistent Internet connection. They will continue to function 24/7, thanks to Dynamic DNS.

Best Dynamic DNS providers

If you’ve already chosen that Dynamic DNS is the way to go, here are a few respectable companies to look into:

  • ClouDNS offers a free Dynamic DNS subscription, which may be an excellent place to start for many people. It’s easy to set up on various operating systems and network devices.
  • FreeDNS provides a free Dynamic DNS service for hosting domains and subdomains and web forwarding and URL cloaking.
  • One other great DNS provider is ChangeIP. For IP mapping to a subdomain on their system, this hosting business offers both free and premium solutions and Dynamic DNS to any domain for a fee.

Conclusion

We can infer that Dynamic DNS can help you save time and money. It is a really useful technology. It may even be the only reasonable answer to a problem in some situations. Assume you wish to deliver services or connect and operate many devices, such as CCTV cameras, over the Internet. Take a look!

10, Mar 2022
What does a DDoS attack mean?

What exactly is a DDoS attack?

A DDoS or Distributed-Denial-of-Service attack is a form of cyber attempt. It means that the goal of a DDoS assault is to overload a server, computer, or network with massive amounts of traffic generated from various sources. Then, when the target fails, its services or access to it for regular users is denied.

When cybercriminals succeed in shutting down your company, it will have an impact on your revenues. Furthermore, it will increase your costs for resolving the issue and harm your reputation. In addition, a DDoS attack might be used as a distraction by thieves in preparation for another data breach attack. So, if your website is down for an extended period of time, your search engine ranking may suffer.

How does it work?

DDoS attacks are mostly caused by devices connected to the Internet. Malware infects many appliances, computers, and IoT, and the attacker gains control of them. Bots or zombies are terms commonly used to characterize such devices, and a botnet is a collection of them.

The hacker is now ready to launch the attack after establishing the botnet. They’re all controlled from afar, and each one is given orders. All of the zombies or bots that are affected send requests to the victim’s IP address. Eventually, the network or server will become overburdened and unable to handle the load. Because each bot seems to be a standard Internet device, distinguishing between legitimate and malicious traffic is difficult.

DDoS attacks types

We can divide DDoS attacks into three categories:

  • Attacks on the application layer — They overwhelm applications with bogus requests.
  • Assaults that deliver a large amount of harmful traffic to a device, website, or server are known as volume-based attacks. There are ICMP, UDP, and spoofed-packet flood attacks, for example.
  • DDoS attacks at the network layer or protocol level send vast amounts of packets to their target network infrastructures and tools. SYN floods and Smurf DDoS are two well-known protocol attacks.

For all forms of attacks, the purpose is always the same. That is to make the target’s resources sluggish and unresponsive at all times.

How can you defend yourself against a DDoS attack?

  • Always keep your systems up to date. If you run your own DNS server, you must keep it up to date at all times. You should keep an eye out for potential flaws or malfunctions and update your software on a regular basis. 
  • Monitoring of traffic. For stopping a DDoS attack, technology that constantly monitors data and detects abnormal patterns and abrupt traffic surges is critical.
  • Have load balancing technology. It distributes traffic by routing it from one server to another, attempting to strike a balance that keeps servers from becoming overburdened.
  • Invest in anti-DDoS software. You need modern technology to increase your defense against DDoS attacks. A combination of tools, rather than a single one. It will cost you money, but it will be much less than the cost of dealing with the aftermath of an attack.

Recommended article: DNS outage – Definition and Details

Conclusion

DDoS attacks are a significant problem. They are a successful method of disrupting web services. They have the ability to take down your website for an extended length of time. But for this not to happen, prepare yourself!

25, Feb 2022
Basic Internet Terms and Definitions

Here are some of the most popular and basic Internet terms and their definitions.

Internet

The Internet is, also known as the net or web, is a global interconnected network that allows people to share information and communicate with each other. It was created thanks to the extensive progress in computing technology. Additionally, in many cases, the Internet is referred to as a “network of networks.”

WWW

The short WWW stands for World Wide Web, and it is a graphical interface for the Internet. The first time that it was introduced and available for the public was back in 1991 by Tim Berners-Lee. It is important to mention that the Internet and WWW are actually not the same things. Yet, the majority of the people still think WWW is the Internet. However, the Internet allows you to connect and communicate with your device with other devices and machines. On the other hand, the WWW is a group of web pages kept in a web server and connected to local devices through the Internet.

DNS

DNS is a short acronym that stands for Domain Name System. It is a global naming database built in a hierarchical order that stores and links all of the existing domain names with their associated IP addresses. This naming system is essential for the Internet and the overall user experience. Without it, people would be forced to use only IP addresses to connect with their favorite websites. That sounds like a memory challenge!

Domain name

The domain name is a simple text identifier that allows humans to easily find their favorite websites. Each domain name is a string of text that is unique. Due to the fact it exists, humans are able to discover devices, networks, services, computers on the Internet very fast. Two different websites could not share the very same domain name. 

IP address 

The IP address is also an identifier, yet it is numerical. The different machines and servers do not understand words. For that reason, they connect and communicate through each other via IP addresses. Due to the fact that the Internet has grown massively back in the days, the need for more IP addresses increased. That is why there are two versions – IPv4, which is the older one, and IPv6, which is the newer one.

TCP/IP

TCP/IP stands for Transmission Control Protocol/Internet Protocol, and it combines two protocols to establish Internet communication and allow the connection between two devices that are long-distance apart.

The Internet is a packet-switched network. Additionally, the data is divided into smaller packets, transferred separately, and then reassembled at the target destination. TCP is responsible for collecting and reassembling the data packets, and IP is the component that guarantees that the data packets are transferred to the proper target location.

FTP

File Transfer Protocol, or for short FTP, is a popular network protocol. Its main purpose is to transfer files among devices and machines over a TCP/IP-based network (the Internet). Thanks to this protocol, we are able to exchange information across the Internet. The need for sharing data was very common, and the File Transfer Protocol was one of the first developments that could solve it. 

Suggested article: 7 most commonly used DNS record types

Conclusion

So, now you know some of the fundamental Internet terms. Additionally, now you are going to be more aware while you are browsing on the Internet of what the different components mean!