Back

Shiva Prasad

ย โ€ขย 

Lognormalย โ€ขย 5m

I suggest using DNS Provider like cloudflare and then. use A record to point to your web server. It protects from Server IP Publishing and DDOS Attack with free SSL and more

Reply
1

More like this

Recommendations from Medial

Image Description

Abdul Alim

Building Lovable for...ย โ€ขย 6d

Crazzy Grind Day 23 โšก Todayโ€™s plan was simple โ€” spend the whole day on SEO and marketing. But then someone told me, โ€œHey, Crazzyโ€™s server isnโ€™t working.โ€ I checked everything โ€” backend, frontend, domain, even logs. After hours of digging, I finally

See More
2 Replies
7
Image Description
Image Description

PAVANKALYANNAIK A

Co founder at Scutsย โ€ขย 9m

Hello Our app is developed in Flutter and node js. We have out sourced people to develop it. We have deployed our app on E2E networks server. When we are publishing our app into playstore. Playstore rejected app for reasons: โ€ข Internal server error

See More
5 Replies
4

Comet

#freelancerย โ€ขย 10m

How to create your own VPN server You know, VPNs can be banned. To prevent this from happening, you need to create your own VPN server. Too complicated? Come on, there's Amnezia. The whole setup is a matter of a couple of minutes. You โœ”๏ธspecify

See More
Reply
2
4

Comet

#freelancerย โ€ขย 5m

How to know how anonymous on the Internet you are All the sites you visit can see your address, IP and ISP name. But if you care about your anonymity, you probably use a VPN or Tor to prevent sites from finding out your real identity. Proxy6 colle

See More
Reply
5
Image Description

Arnav Aggarwal

Love to Code | React...ย โ€ขย 7m

Hit an unexpected 'rate limit' message while creating Studio Ghibli-style images on ChatGPT? You weren't alone.This is a great example of API traffic management techniques like Rate Limiting and Throttling. โžก๏ธRate Limiting - Sets a hard cap; reque

See More
1 Reply
2
11
Image Description

Comet

#freelancerย โ€ขย 11m

Here are 30 cybersecurity search engines: 1. Dehashedโ€”View leaked credentials. 2. SecurityTrailsโ€”Extensive DNS data. 3. DorkSearchโ€”Really fast Google dorking. 4. ExploitDBโ€”Archive of various exploits. 5. ZoomEyeโ€”Gather information about targets. 6.

See More
1 Reply
3
4

Vasvi Seth

Cyber Security Stude...ย โ€ขย 1y

Understanding Network Protocols: The Backbone of Digital Communication In the world of networking, protocols are crucial. A network protocol is essentially a set of rules used by two or more devices on a network to dictate the delivery and structure

See More
Reply
5

Vasvi Seth

Cyber Security Stude...ย โ€ขย 1y

Exploring Communication Protocols: Transmission Control Protocol (TCP) Communication protocols are the cornerstone of network transmission, dictating how data is exchanged between devices. They ensure efficient and reliable communication, including

See More
Reply
5

Sheikh Ayan

Founder of VistaSec:...ย โ€ขย 8m

๐Ÿšจ Critical Alert: Ransomware Attack on Ardent Health Services ๐Ÿšจ In November 2023, Ardent Health Services fell victim to a ransomware attack, forcing the healthcare provider to take its network offline to contain the damage. This led to operational

See More
Reply
1

Somen Das

Senior developer | b...ย โ€ขย 5m

I messed up things. I am building an opensource package to connect multiple S3 compatible services like cloudflare r2, digitalocean etc. so when testing I used original API keys and I totally forgot to remove things and just did npm publish. and the

See More
Reply
3

Download the medial app to read full posts, comements and news.