Back

Shiva Prasad

 • 

Lognormal • 1m

I suggest using DNS Provider like cloudflare and then. use A record to point to your web server. It protects from Server IP Publishing and DDOS Attack with free SSL and more

Reply
1

More like this

Recommendations from Medial

Image Description
Image Description

PAVANKALYANNAIK A

Co founder at Scuts • 6m

Hello Our app is developed in Flutter and node js. We have out sourced people to develop it. We have deployed our app on E2E networks server. When we are publishing our app into playstore. Playstore rejected app for reasons: • Internal server error

See More
5 Replies
4

Comet

#freelancer • 6m

How to create your own VPN server You know, VPNs can be banned. To prevent this from happening, you need to create your own VPN server. Too complicated? Come on, there's Amnezia. The whole setup is a matter of a couple of minutes. You ✔️specify

See More
Reply
2
4

Comet

#freelancer • 2m

How to know how anonymous on the Internet you are All the sites you visit can see your address, IP and ISP name. But if you care about your anonymity, you probably use a VPN or Tor to prevent sites from finding out your real identity. Proxy6 colle

See More
Reply
5
Image Description

Arnav Aggarwal

Love to Code | React... • 3m

Hit an unexpected 'rate limit' message while creating Studio Ghibli-style images on ChatGPT? You weren't alone.This is a great example of API traffic management techniques like Rate Limiting and Throttling. ➡️Rate Limiting - Sets a hard cap; reque

See More
1 Reply
2
11
Image Description

Comet

#freelancer • 8m

Here are 30 cybersecurity search engines: 1. Dehashed—View leaked credentials. 2. SecurityTrails—Extensive DNS data. 3. DorkSearch—Really fast Google dorking. 4. ExploitDB—Archive of various exploits. 5. ZoomEye—Gather information about targets. 6.

See More
1 Reply
3
4

Vasvi Seth

Cyber Security Stude... • 1y

Understanding Network Protocols: The Backbone of Digital Communication In the world of networking, protocols are crucial. A network protocol is essentially a set of rules used by two or more devices on a network to dictate the delivery and structure

See More
Reply
5

Vasvi Seth

Cyber Security Stude... • 1y

Exploring Communication Protocols: Transmission Control Protocol (TCP) Communication protocols are the cornerstone of network transmission, dictating how data is exchanged between devices. They ensure efficient and reliable communication, including

See More
Reply
5

Sheikh Ayan

Founder of VistaSec:... • 4m

🚨 Critical Alert: Ransomware Attack on Ardent Health Services 🚨 In November 2023, Ardent Health Services fell victim to a ransomware attack, forcing the healthcare provider to take its network offline to contain the damage. This led to operational

See More
Reply
1

Somen Das

Senior developer | b... • 1m

I messed up things. I am building an opensource package to connect multiple S3 compatible services like cloudflare r2, digitalocean etc. so when testing I used original API keys and I totally forgot to remove things and just did npm publish. and the

See More
Reply
3

Saksham

Legal Advisor! • 1y

Shark Tank Teaches Us: Contracts Matter Shark Tank India's legal drama shows why handshake deals won't do. A strong agreement, like the one that saved my design client, protects your agency from: ●Unauthorized Use: Client uses your work for unappro

See More
Reply
9

Download the medial app to read full posts, comements and news.