serverok.pl is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.
This server runs the snac software and there is no automatic sign-up process.
System Administration: Week 7: DNS, Part I
In this video, we are beginning our discussion of the #DNS. We go back to the early days of the internet when copying /etc/hosts from system to system was the way to resolve hosts...
(Hosts file from 1983: https://rscott.org/OldInternetFiles/hosts.19831104.txt)
...and we cover the structure of the domain name space and the creation of the top-level domains.
(Second-level domain inventory from 1987: https://rscott.org/OldInternetFiles/domain-info.19871215.txt)
System Administration: Week 7: DNS, Part II
In this video, we dissect DNS lookups performed on our EC2 instance, then discuss just how a caching resolver performs the lookup, moving from "magic happens here" to the below visualization.
System Administration: Week 7: DNS, Part III
In this video, we try to wrap up our discussion of the Domain Name System by addressing the nature of the root nameservers, looking at various different resource record types, observing reverse lookups, and thinking about how we can have assurance of authenticity and integrity of the DNS results returned to us via DNSSEC.
Weekend Reads
* Secure DNS deployment guide
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-81r3.pdf
* Domain name renewals across ccTLDs
https://www.sidnlabs.nl/en/news-and-blogs/analysing-domain-name-renewals-across-cctlds
* Exposed API credentials on the web
https://arxiv.org/abs/2603.12498
* Russia increasingly disconnecting Internet
https://www.politico.com/news/2026/03/14/russias-self-inflicted-communication-crisis-00827197
* NIST 5G cybersecurity series papers
https://www.nccoe.nist.gov/5g-cybersecurity
🔴 A threat isn't much of a threat if it can't reach the right victims. 📦 That's why many modern threat actors rely on cloakers and traffic distribution systems (TDS) to target, route, and hide at scale. In a six‑month joint effort analyzing four months of data with Confiant, we identified 15,500 domains configured to Keitaro instances and actively used in cyber campaigns. Keitaro is a legitimate ad tracker, but it is frequently misused by cybercriminals as an all‑in‑one tracker + TDS + cloaker in scam and malware campaigns. We encounter Keitaro in our investigations nearly every day, and we set out to quantify that abuse in the broader landscape. We're publishing a three‑part series to share what we learned. Part 1 focuses on a subset of actors who leverage AI in their operations, most of whom are tied to investment scams. At the end of the report, you'll find a link to our github repository that contains thousands of related Keitaro iocs.
#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #ai #keitaro #adtech #tds #trafficdistributionsystem #cloaker #cloaking #landscape #malvertising
Anyone else heard about the sourvereign, and alternative #DNS #TLD chn. ? There is a #Wikipedia article in Chinese. I am unsure if it is actually something actively pursued in #China to step up their #Internet #control game. Or if it was merely a financial asset to attract venture capital?
Would love some insights from more knowledable people.