An SPF record is basically a DNS record of the TXT type, which contains information about who may send email from your domain. It is used to avoid spoofing and spam. So how does it work? Basically, when a (decent)… Read More »What is an SPF record? And why use them?
It’s handy to know, so here they are: To restore Pi-hole to the default blocking lists, just delete all the lists but these six lists. Note: There used to be a seventh list, which has been discontinued, so you can… Read More »What are the default Pi-hole block lists?
While VPN’s are great for virtual private networks (hence the name), it is often overkill if you just want to bypass a firewall or get an encrypted tunnel to protect yourself from snooping (e.g. on public Wi-Fi). More often than… Read More »Using an SSH tunnel to bypass firewalls and protecting yourself from snooping
Revoking certain certificates on March 4th – 5th, 2020 UTC Due to a bug related to CAA checking in Let’s Encrypt, millions of certificates will be revoked “today”. To quickly check if your domains are affected, use this tool: https://checkhost.unboundtest.com/… Read More »Let’s Encrypt 2020.02.29 CAA Rechecking Bug
This is important if you are automatically deploying web-apps using git (for example with a GitHub deploy key). What’s this about? If you are deploying your web-apps using git pull, either manually or automatically, chances are you are deploying straight… Read More »Stop your web server from leaking your “.git” directory
Maybe you became aware that your emails are going straight to your recipient’s junk folder. Of course, you are wondering why. Try this email tester to quickly check for possible issues as to why that might be! What tester? There… Read More »Are your emails going straight to spam? Try this email tester!
You might need to chroot into a Linux distro of a different platform to run executables of that platform, and perform tasks. I will show you how! Getting the dependencies For this to work, you will need the correct qemu… Read More »How to chroot to a different platform on Linux using a single binary!
In my previous guides I showed you how to set up Tor, obfs4proxy and how to use it with Tor Browser. But what if you want to use your bridge from within the Tor daemon directly? I will show you… Read More »Using bridges with Tor daemon (service)