In the stormy race of the digital transformation, the hybrid landscape of corporate IT is increasingly evading manageability. Could the control plane of a hyperscaler provide a lasting remedy? Would you need special hardware?
Tip of the day: domain intelligence services by CentralOps
Here is one nifty service that can dig up useful information about a website, a domain or an IP address and it doesn’t cost a dime.
How to flash the Netgear Nighthawk X10 R9000 with DD-WRT without bricking the router
Open-source router firmware can open up a whole new world of possibilities when it comes to internet connectivity. For many people, the firmware of choice is DD-WRT. All you need is a wireless router, a service that supports its functionality and you are good to go.
The Netgear Nighthawk X10 R9000 is indisputably one of the best wireless routers out there. It’s pricey, too. One way to make the whole investment more affordable is by flashing the router yourself as opposed to buying one from a third-party vendor.
DNS over HTTPS
Many government agencies and multinationals alike have repeatedly fallen victim to hacking, but little to nothing has been done to fix the problem once and for all.
There is no silver bullet. In matters of cyber security, a so-called solution can only offer a time-limited value. Cyber security threats are always evolving. Cyber criminals never stand still. You have to keep shooting your silver bullets if you even happen to have them.
DNS-over-HTTPS protocol (IETF RFC8484) (DoH for short) is such a solution to the pressing cyber security problem of unencrypted communications. It was designed by the Internet Engineering Task Force, Google, Mozilla and others.
DNS versus DNS over HTTPs
Actually, DoH sounds like something of an overkill. After all, HTTPs connections are encrypted already, so why bother implementing DNS over HTTPS?
DoH works by sending DNS requests via an encrypted HTTPS tunnel instead of using a classic plaintext UDP request.
Wait, there is more to it. DoH is not just encrypted, it works on the app level instead of the OS level. The idea behind DoH is to use DNS-over-HTTPS connections between an app (e.g. a browser or a mobile app) and an encrypted DoH-compatible DNS server, called a resolver.
The complete DoH-traffic relies exclusively on HTTPS without any exceptions. That’s the beauty of the DoH concept.
All DoH domain name queries are encrypted and then camouflaged in regular web traffic, which is in turn sent to the DoH-compliant DNS-resolver. The latter one replies with a domain name’s IP address over HTTPS.
Don’t trust the Operating System
While open source operating systems like Linux, BSD or Solaris are designed to be highly secure, commercial off-the-shelf operating systems like Windows and macOS usually don’t hold a candle to the standards of enterprise-grade security. As a house owner you wouldn’t secure just the front and the garage doors while keeping the side doors wide open. But that’s how commercial operating systems nowadays work.
Cyber security in commercial operating systems is only skin-deep. Where no one is looking, security is usually non-existent.
As a result of the DoH-design, apps can re-gain control of DNS queries from intentionally half-baked operating systems by hard-wiring a list of trusted DNS-over-HTTPS servers (resolvers). This way, you can set up a list of your own trusted IPs with trustworthy resolvers.
DNS-over-HTTPS is gaining steam
The list of cyber security mishaps reads like the Who is Who of the IT industry and government. No one seems immune. DoH is one way you can regain a bit of security.
SELinux tips, tricks, hacks and gotchas
Most of us have a love-hate relationship with SELinux.
- « Previous Page
- Next Page »