Articles on Networking
- Cloud How to Deploy Your Own Algo VPN Server in the DigitalOcean Cloud Tunneling connections through a VPN in a public cloud helps conceal your origin and safeguard traffic when performing security research or connecting over untrusted networks. Algo VPN is an...
- Networking A Close Look at PayPal Overpayment Scams That Target Craigslist Sellers PayPal overpayment scams target Craigslist sellers using fake payment notifications that ask victims to wire funds to a third-party "pickup agent." Scammers craft stories about working in rural areas...
- Malware Tunneling Data and Commands Over DNS to Bypass Firewalls Adversaries can tunnel command and control traffic through DNS queries to bypass firewalls, even when environments restrict outbound DNS to trusted servers. Tools like dnscat2 demonstrate how easily...
- Web Security Free Online Tools for Looking up Potentially Malicious Websites A curated list of free online tools for investigating potentially malicious websites, ranging from services that provide historical reputation data to those that examine URLs in real time. Options...
- Malware Internet Noise and Malicious Requests to a New Web Server A new web server with no public content immediately receives scans for open proxies, probes from potentially infected systems, and searches for phpMyAdmin vulnerabilities. These requests represent...
- Networking Free Blocklists of Suspected Malicious IPs and URLs A curated list of free blocklists containing IP addresses and URLs of systems suspected of malicious activity. Sources include DShield, PhishTank, Shadowserver, and others—each with different...