serverok.pl is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
lonely small server
Admin email
postmaster@serverok.pl
Admin account
@mend0za@serverok.pl

Search results for tag #dns

B'ad Samurai 🐐🇺🇦 »
@badsamurai@infosec.exchange

@porkbun RDAP is a pretty silly address and I appreciate that.

You never see ‘.horse‘ in IOCs because it’s a $25 domain!

{
"value": "https://cart-before.porkbun.horse/rdap/",
"rel": "about",
"href": "https://cart-before.porkbun.horse/rdap/",
"type": "application/rdap+json”
}

Alt...{ "value": "https://cart-before.porkbun.horse/rdap/", "rel": "about", "href": "https://cart-before.porkbun.horse/rdap/", "type": "application/rdap+json” }

    Jan Schaumann »
    @jschauma@mstdn.social

    System Administration: Week 7: DNS, Part I

    In this video, we are beginning our discussion of the . We go back to the early days of the internet when copying /etc/hosts from system to system was the way to resolve hosts...

    (Hosts file from 1983: rscott.org/OldInternetFiles/ho)

    ...and we cover the structure of the domain name space and the creation of the top-level domains.

    (Second-level domain inventory from 1987: rscott.org/OldInternetFiles/do)

    youtu.be/-bpIT7M9i00

      Jan Schaumann »
      @jschauma@mstdn.social

      System Administration: Week 7: DNS, Part II

      In this video, we dissect DNS lookups performed on our EC2 instance, then discuss just how a caching resolver performs the lookup, moving from "magic happens here" to the below visualization.

      youtu.be/z55ULZcKP8A

        Jan Schaumann »
        @jschauma@mstdn.social

        System Administration: Week 7: DNS, Part III

        In this video, we try to wrap up our discussion of the Domain Name System by addressing the nature of the root nameservers, looking at various different resource record types, observing reverse lookups, and thinking about how we can have assurance of authenticity and integrity of the DNS results returned to us via DNSSEC.

        youtu.be/XDJEJFVNoko

        World map showing the locations of the root servers.

        Alt...World map showing the locations of the root servers.

          John Kristoff »
          @jtk@infosec.exchange

          Infoblox Threat Intel »
          @InfobloxThreatIntel@infosec.exchange

          🔴 A threat isn't much of a threat if it can't reach the right victims. 📦 That's why many modern threat actors rely on cloakers and traffic distribution systems (TDS) to target, route, and hide at scale. In a six‑month joint effort analyzing four months of data with Confiant, we identified 15,500 domains configured to Keitaro instances and actively used in cyber campaigns. Keitaro is a legitimate ad tracker, but it is frequently misused by cybercriminals as an all‑in‑one tracker + TDS + cloaker in scam and malware campaigns. We encounter Keitaro in our investigations nearly every day, and we set out to quantify that abuse in the broader landscape. We're publishing a three‑part series to share what we learned. Part 1 focuses on a subset of actors who leverage AI in their operations, most of whom are tied to investment scams. At the end of the report, you'll find a link to our github repository that contains thousands of related Keitaro iocs.

          infoblox.com/blog/threat-intel

            Max Resing »
            @resingm@infosec.exchange

            Anyone else heard about the sourvereign, and alternative chn. ? There is a article in Chinese. I am unsure if it is actually something actively pursued in to step up their game. Or if it was merely a financial asset to attract venture capital?

            Would love some insights from more knowledable people.

              1 ★ 1 ↺
              d4s boosted

              mend0za »
              @mend0za@serverok.pl

              Тернистый Путь Греха в сетапе личного PrivateDNS для Android со встроенной баннеро-резалкой.

              Весь мой вчерашний и позавчерашний день, в борьбе с Unbound , DNS-over-TLS , #letsencrypt, AppArmor и, естественно , Linux.

              #unbound опять не запускается

              Alt...#unbound опять не запускается

              #AppArmor мешает #unbound читать сертификаты #letsencrypt

              Alt...#AppArmor мешает #unbound читать сертификаты #letsencrypt