<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Post4VPS Forum | Free VPS Provider - Internet Technology]]></title>
		<link>https://post4vps.com/</link>
		<description><![CDATA[Post4VPS Forum | Free VPS Provider - https://post4vps.com]]></description>
		<pubDate>Fri, 01 May 2026 07:57:26 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Share Your Internet Speed]]></title>
			<link>https://post4vps.com/Thread-Share-Your-Internet-Speed</link>
			<pubDate>Sun, 29 Aug 2021 22:35:42 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=874">hamed</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Share-Your-Internet-Speed</guid>
			<description><![CDATA[Hello, friends.<br />
I wanted to know about the internet speeds of countries.<br />
I know there are articles on the Internet about this issue, but I want to see the speed at which ordinary people can use it.<br />
<br />
Well, before sending a photo of your Internet speed, please tell us the country you live in and let us know if the speed you are receiving using adsl from either mobile phone or ...<br />
Lets go . first me . this is my internet speed from my phone internet and i'm from netherlands<br />
<img src="https://www.speedtest.net/result/11955292991.png" loading="lazy"  alt="[Image: 11955292991.png]" class="mycode_img" />]]></description>
			<content:encoded><![CDATA[Hello, friends.<br />
I wanted to know about the internet speeds of countries.<br />
I know there are articles on the Internet about this issue, but I want to see the speed at which ordinary people can use it.<br />
<br />
Well, before sending a photo of your Internet speed, please tell us the country you live in and let us know if the speed you are receiving using adsl from either mobile phone or ...<br />
Lets go . first me . this is my internet speed from my phone internet and i'm from netherlands<br />
<img src="https://www.speedtest.net/result/11955292991.png" loading="lazy"  alt="[Image: 11955292991.png]" class="mycode_img" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Have you heard about Pegasus Spyware?]]></title>
			<link>https://post4vps.com/Thread-Have-you-heard-about-Pegasus-Spyware</link>
			<pubDate>Tue, 20 Jul 2021 03:00:12 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=14">Littlemaster</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Have-you-heard-about-Pegasus-Spyware</guid>
			<description><![CDATA[A few days ago I received a strange call from a lady from a far away location. As the call seemed a bit strange, I took the phone with care. I heard a voice of a lady. She wasn't properly saying "hello", but her voice was of a kind of flirting "hlo". I became more anxious. I waited once again before responding to the lady. Once again her voice is "hlo". I felt something serious and I disconnected the phone. She tried again, but I just left the call as missed. The next day once again she called when I was speaking with someone else. After disconnecting the call, I dialled her number and she took up the phone with the same hlo. I replied this time with a serious tone "hello". But her question was what is your name?. She called me without knowing who is me. I disconnected and blocked the number.<br />
Privacy is a serious concern in the new era. Even informations are leaking through missed calls. Pegasus, a spyware or Trojan horse created by NSO is trending news in India after accused of hacking information from well known people over phone. It installs itself on the victim's phone whether it is Android or iPhone.Then leaks data including media and various logs. Finally it disappears itself without leaving any evidence. This was created by an Israeli company in the sake of restricting crime and terrorism. It seems used to target high profiled people. I don't know who were attacked recently. But I feel the privacy under risk.]]></description>
			<content:encoded><![CDATA[A few days ago I received a strange call from a lady from a far away location. As the call seemed a bit strange, I took the phone with care. I heard a voice of a lady. She wasn't properly saying "hello", but her voice was of a kind of flirting "hlo". I became more anxious. I waited once again before responding to the lady. Once again her voice is "hlo". I felt something serious and I disconnected the phone. She tried again, but I just left the call as missed. The next day once again she called when I was speaking with someone else. After disconnecting the call, I dialled her number and she took up the phone with the same hlo. I replied this time with a serious tone "hello". But her question was what is your name?. She called me without knowing who is me. I disconnected and blocked the number.<br />
Privacy is a serious concern in the new era. Even informations are leaking through missed calls. Pegasus, a spyware or Trojan horse created by NSO is trending news in India after accused of hacking information from well known people over phone. It installs itself on the victim's phone whether it is Android or iPhone.Then leaks data including media and various logs. Finally it disappears itself without leaving any evidence. This was created by an Israeli company in the sake of restricting crime and terrorism. It seems used to target high profiled people. I don't know who were attacked recently. But I feel the privacy under risk.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Telegram Bots - How safe they are?  I need a welcome bot.]]></title>
			<link>https://post4vps.com/Thread-Telegram-Bots-How-safe-they-are-I-need-a-welcome-bot</link>
			<pubDate>Sun, 11 Jul 2021 15:01:43 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=14">Littlemaster</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Telegram-Bots-How-safe-they-are-I-need-a-welcome-bot</guid>
			<description><![CDATA[Hello everyone,<br />
I need to know how safe is our telegram bots are? I need to set a welcome text in a particular group, which will send terms and rules of group to the new joined user.<br />
This group is of teachers who are going to be in government schools. That means they will be much concerned about their privacy. I think teachers take care of each points, so criticism will come. They fear hacking. Let me know the safest way to do this.]]></description>
			<content:encoded><![CDATA[Hello everyone,<br />
I need to know how safe is our telegram bots are? I need to set a welcome text in a particular group, which will send terms and rules of group to the new joined user.<br />
This group is of teachers who are going to be in government schools. That means they will be much concerned about their privacy. I think teachers take care of each points, so criticism will come. They fear hacking. Let me know the safest way to do this.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[XOL] Xolentum - The Future is Digital]]></title>
			<link>https://post4vps.com/Thread-XOL-Xolentum-The-Future-is-Digital</link>
			<pubDate>Wed, 19 Aug 2020 14:16:42 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=1421">Sn1F3rt</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-XOL-Xolentum-The-Future-is-Digital</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><span style="color: red;" class="mycode_color"><span style="font-size: xx-large;" class="mycode_size">XOLENTUM</span></span></span></span></div>
<br />
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><span style="color: blue;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size">The Future is Digital</span></span></span></span></div>
<br />
<div style="text-align: center;" class="mycode_align"><span style="font-style: italic;" class="mycode_i"><span style="font-weight: bold;" class="mycode_b">Xolentum is a decentralized, peer-to-peer and open source digital currency.<br />
It's fast, secure and completely private.</span></span></div>
<br />
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><a href="https://github.com/xolentum" target="_blank" rel="noopener" class="mycode_url">GitHub</a> | <a href="https://chat.xolentum.org" target="_blank" rel="noopener" class="mycode_url">Discord</a> | <a href="https://facebook.com/xolentum" target="_blank" rel="noopener" class="mycode_url">Facebook</a> | [url=https://twitter.com/<dvz_me_placeholder id="0" />]Twitter[/url] | [url=https://medium.com/<dvz_me_placeholder id="1" />]Medium[/url]</span></div>
<br />
But why Xolentum ... ? Most of the existing cryptocurrencies, like Bitcoin and Ethereum, have transparent blockchains. This means that user's activity and transactions are traceable by anyone. With Xolentum that's not the case. Xolentum transactions are untraceable, since the sending and receiving addresses as well as transacted amounts remain private.<br />
<br />
Xolentum doesn't have a premine, we do not believe in reserving funds for ourselves. Everything is fair and equal for all. <br />
<br />
Xolentum uses Monero's industry leading technology and we plan to follow them closely to stay ahead of the curve. Hence, Xolentum uses RandomX hashing algorithm, which means that it is ASIC resistant, and mineable only by CPU and GPU. Our main objective behind this, is that the person mining even on the minimal hardware should not go unrewarded.<br />
<br />
Xolentum has a 60-second block time, which means that not only transactions are secure, but fast too. Moreover, the network fee is very low.<br />
<br />
<span style="color: purple;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Specifications</span></span></span><br />
<ul class="mycode_list"><li>Name - Xolentum<br />
</li>
<li>Ticker - XOL<br />
</li>
<li>Supply - Not fixed<br />
</li>
<li>Initial Block Reward - 50 XOL<br />
</li>
<li>Block time - 60 seconds<br />
</li>
<li>Decimal Points - 12<br />
</li>
<li>Ports - 13579 (p2p) and 13580 (RPC)<br />
</li>
</ul>
<span style="color: purple;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Important Links</span></span></span><br />
<br />
Official Website : <a href="https://xolentum.org/" target="_blank" rel="noopener" class="mycode_url">https://xolentum.org/</a><br />
Block Explorer   : <a href="https://explorer.xolentum.org" target="_blank" rel="noopener" class="mycode_url">https://explorer.xolentum.org</a> (Not live yet)<br />
BitCoinTalk thread : <a href="https://bitcointalk.org/index.php?topic=5269099.0" target="_blank" rel="noopener" class="mycode_url">https://bitcointalk.org/index.php?topic=5269099.0</a><br />
<br />
Team               : <a href="https://xolentum.org/community/team/" target="_blank" rel="noopener" class="mycode_url">https://xolentum.org/community/team/</a><br />
Services           : <a href="https://xolentum.org/community/services/" target="_blank" rel="noopener" class="mycode_url">https://xolentum.org/community/services/</a><br />
<br />
Documentation : <a href="https://xolentum.org/resources/documentation/" target="_blank" rel="noopener" class="mycode_url">https://xolentum.org/resources/documentation/</a><br />
Guides             : <a href="https://xolentum.org/resources/guides/" target="_blank" rel="noopener" class="mycode_url">https://xolentum.org/resources/guides/</a><br />
Press Kit          : <a href="https://xolentum.org/resources/press-kit/" target="_blank" rel="noopener" class="mycode_url">https://xolentum.org/resources/press-kit/</a><br />
<br />
<hr class="mycode_hr" />
<br />
It's a matter of extreme pride for us to announce that we are launching our public testnet today. Testing and debugging will go on for about a week, and then we will launch our mainnet. <br />
<br />
We have already implemented CSLAG into our codebase, which significantly reduces the size of transactions. <br />
<br />
We give equal importance to the use case of a coin. Hence, it's a pleasure to announce that we are also developing a game which will be using the coin. To make it cross platform, we plan to have it web-based. It will be released shortly after the mainnet is launched. <br />
<br />
We want to build a active community around our project. We already have a lot of users who know about the project and are showing a huge interest in it, and we wish it keep growing forever.<br />
<br />
Hope to see you all on our Discord server, which is our main community hotspot.  <img src="https://post4vps.com/images/emoji/smile.png" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
Regards,]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><span style="color: red;" class="mycode_color"><span style="font-size: xx-large;" class="mycode_size">XOLENTUM</span></span></span></span></div>
<br />
<div style="text-align: center;" class="mycode_align"><span style="text-decoration: underline;" class="mycode_u"><span style="font-weight: bold;" class="mycode_b"><span style="color: blue;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size">The Future is Digital</span></span></span></span></div>
<br />
<div style="text-align: center;" class="mycode_align"><span style="font-style: italic;" class="mycode_i"><span style="font-weight: bold;" class="mycode_b">Xolentum is a decentralized, peer-to-peer and open source digital currency.<br />
It's fast, secure and completely private.</span></span></div>
<br />
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><a href="https://github.com/xolentum" target="_blank" rel="noopener" class="mycode_url">GitHub</a> | <a href="https://chat.xolentum.org" target="_blank" rel="noopener" class="mycode_url">Discord</a> | <a href="https://facebook.com/xolentum" target="_blank" rel="noopener" class="mycode_url">Facebook</a> | [url=https://twitter.com/<dvz_me_placeholder id="0" />]Twitter[/url] | [url=https://medium.com/<dvz_me_placeholder id="1" />]Medium[/url]</span></div>
<br />
But why Xolentum ... ? Most of the existing cryptocurrencies, like Bitcoin and Ethereum, have transparent blockchains. This means that user's activity and transactions are traceable by anyone. With Xolentum that's not the case. Xolentum transactions are untraceable, since the sending and receiving addresses as well as transacted amounts remain private.<br />
<br />
Xolentum doesn't have a premine, we do not believe in reserving funds for ourselves. Everything is fair and equal for all. <br />
<br />
Xolentum uses Monero's industry leading technology and we plan to follow them closely to stay ahead of the curve. Hence, Xolentum uses RandomX hashing algorithm, which means that it is ASIC resistant, and mineable only by CPU and GPU. Our main objective behind this, is that the person mining even on the minimal hardware should not go unrewarded.<br />
<br />
Xolentum has a 60-second block time, which means that not only transactions are secure, but fast too. Moreover, the network fee is very low.<br />
<br />
<span style="color: purple;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Specifications</span></span></span><br />
<ul class="mycode_list"><li>Name - Xolentum<br />
</li>
<li>Ticker - XOL<br />
</li>
<li>Supply - Not fixed<br />
</li>
<li>Initial Block Reward - 50 XOL<br />
</li>
<li>Block time - 60 seconds<br />
</li>
<li>Decimal Points - 12<br />
</li>
<li>Ports - 13579 (p2p) and 13580 (RPC)<br />
</li>
</ul>
<span style="color: purple;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">Important Links</span></span></span><br />
<br />
Official Website : <a href="https://xolentum.org/" target="_blank" rel="noopener" class="mycode_url">https://xolentum.org/</a><br />
Block Explorer   : <a href="https://explorer.xolentum.org" target="_blank" rel="noopener" class="mycode_url">https://explorer.xolentum.org</a> (Not live yet)<br />
BitCoinTalk thread : <a href="https://bitcointalk.org/index.php?topic=5269099.0" target="_blank" rel="noopener" class="mycode_url">https://bitcointalk.org/index.php?topic=5269099.0</a><br />
<br />
Team               : <a href="https://xolentum.org/community/team/" target="_blank" rel="noopener" class="mycode_url">https://xolentum.org/community/team/</a><br />
Services           : <a href="https://xolentum.org/community/services/" target="_blank" rel="noopener" class="mycode_url">https://xolentum.org/community/services/</a><br />
<br />
Documentation : <a href="https://xolentum.org/resources/documentation/" target="_blank" rel="noopener" class="mycode_url">https://xolentum.org/resources/documentation/</a><br />
Guides             : <a href="https://xolentum.org/resources/guides/" target="_blank" rel="noopener" class="mycode_url">https://xolentum.org/resources/guides/</a><br />
Press Kit          : <a href="https://xolentum.org/resources/press-kit/" target="_blank" rel="noopener" class="mycode_url">https://xolentum.org/resources/press-kit/</a><br />
<br />
<hr class="mycode_hr" />
<br />
It's a matter of extreme pride for us to announce that we are launching our public testnet today. Testing and debugging will go on for about a week, and then we will launch our mainnet. <br />
<br />
We have already implemented CSLAG into our codebase, which significantly reduces the size of transactions. <br />
<br />
We give equal importance to the use case of a coin. Hence, it's a pleasure to announce that we are also developing a game which will be using the coin. To make it cross platform, we plan to have it web-based. It will be released shortly after the mainnet is launched. <br />
<br />
We want to build a active community around our project. We already have a lot of users who know about the project and are showing a huge interest in it, and we wish it keep growing forever.<br />
<br />
Hope to see you all on our Discord server, which is our main community hotspot.  <img src="https://post4vps.com/images/emoji/smile.png" alt="Smile" title="Smile" class="smilie smilie_1" /><br />
<br />
Regards,]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[What is the concept of Jitter in the network and what does it do?]]></title>
			<link>https://post4vps.com/Thread-What-is-the-concept-of-Jitter-in-the-network-and-what-does-it-do</link>
			<pubDate>Sun, 07 Jun 2020 21:42:22 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=874">hamed</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-What-is-the-concept-of-Jitter-in-the-network-and-what-does-it-do</guid>
			<description><![CDATA[What is Jitter and what are its uses? What is the difference between Jitter and Ping?<br />
In this article, all these questions will be answered. <br />
<span style="font-weight: bold;" class="mycode_b">Note:</span> that this article was written by me and one of my friends helped me to write this article and translate it, so if there is a problem in translating the article, please help me by sending a private message or sending a topic.<br />
Today I want to explain the concept of jitter to post4vps members .<br />
And before I start, I would like to ask those any want to use this article for their website please put this website address of the post4vps forum as  source on their website to get a useful backlink for this forum. Otherwise, your work is a theft, and I, as the author of this article, am not satisfied with your work.(copy without perm...).<br />
<br />
<div style="text-align: center;" class="mycode_align"><hr class="mycode_hr" />
</div>
<div style="text-align: center;" class="mycode_align"><span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">Start the article</span></span><br />
<br />
</div>
In very, very simple language, Jitter is the difference between the time our data packet passes from the moment it is sent to the network until it reaches its destination. To give a simpler example, look at two computers, either on an internal network or on a network with very large global dimensions, when they want to communicate with any communication device, whether a Telephone Tablet or even a website their communication is done through the transfer of information packets, these information packets remain on the network for a while to reach the destination, each information packet contains a header and footer and a number that is connected to the previous and next packet. The time it takes for this information packet to stay on the network to reach its destination is called latency.However, our information packages are not always received in a row and in order at the destination, but the information packages may be back and forth, and on the other hand, some information packages may be delayed by 20 milliseconds and others may be delayed. They reach their destination in 60 milliseconds, so there is a delay in normal networks and it doesn't cause any problems...This means that if you are watching an online news story or reading it, 20 milliseconds and 60 milliseconds is not much different for you and you can easily read it..The TCP // IP protocol itself is responsible for counteracting the impact of Jitter on networks. In networks used for VoIP communications, Jitter is very important, and if you send and receive data packets within 10 milliseconds. This delay should not be increased because the sound quality will be very low.<br />
The shorter the delay, the better the quality of your service. In fact, when you want to send information from point A to point B, this information is sent in the form of information packets from point A to B at regular intervals.An information packet may reach in 20 milliseconds and an information packet in 10 milliseconds, and the next one in 60 milliseconds and this delay time is<span style="text-decoration: underline;" class="mycode_u"> <span style="font-weight: bold;" class="mycode_b">Jitter</span></span>.<br />
<div style="text-align: center;" class="mycode_align"><hr class="mycode_hr" />
</div>
My purpose in posting this article was to help you understand the concept of Jitter in the shortest possible time.<br />
Do not doubt that this article will be useful for you in the future and I hope this article has been useful for you.<br />
If I haven't explained something and you know it, please teach us by sending a post in this thread. You can discuss in this thread.<br />
Thank you for reading my article. I'm a writer, but I publish all my articles on my website, and this is the first article I've published on post4vps forum. Please give me reputation if this article is helpful.<br />
good luck my friend's.<br />
<br />
<img src="https://post4vps.com/images/attachtypes/image.png" title="PNG Image" border="0" alt=".png" />
&nbsp;&nbsp;<a href="attachment.php?aid=227" target="_blank" title="">jitterlogo-post4vps-jittersoundlogo-jitterinfo-jitter.lookthat-HaMeD.png</a> (Size: 8.96 KB / Downloads: 31)
]]></description>
			<content:encoded><![CDATA[What is Jitter and what are its uses? What is the difference between Jitter and Ping?<br />
In this article, all these questions will be answered. <br />
<span style="font-weight: bold;" class="mycode_b">Note:</span> that this article was written by me and one of my friends helped me to write this article and translate it, so if there is a problem in translating the article, please help me by sending a private message or sending a topic.<br />
Today I want to explain the concept of jitter to post4vps members .<br />
And before I start, I would like to ask those any want to use this article for their website please put this website address of the post4vps forum as  source on their website to get a useful backlink for this forum. Otherwise, your work is a theft, and I, as the author of this article, am not satisfied with your work.(copy without perm...).<br />
<br />
<div style="text-align: center;" class="mycode_align"><hr class="mycode_hr" />
</div>
<div style="text-align: center;" class="mycode_align"><span style="font-size: medium;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">Start the article</span></span><br />
<br />
</div>
In very, very simple language, Jitter is the difference between the time our data packet passes from the moment it is sent to the network until it reaches its destination. To give a simpler example, look at two computers, either on an internal network or on a network with very large global dimensions, when they want to communicate with any communication device, whether a Telephone Tablet or even a website their communication is done through the transfer of information packets, these information packets remain on the network for a while to reach the destination, each information packet contains a header and footer and a number that is connected to the previous and next packet. The time it takes for this information packet to stay on the network to reach its destination is called latency.However, our information packages are not always received in a row and in order at the destination, but the information packages may be back and forth, and on the other hand, some information packages may be delayed by 20 milliseconds and others may be delayed. They reach their destination in 60 milliseconds, so there is a delay in normal networks and it doesn't cause any problems...This means that if you are watching an online news story or reading it, 20 milliseconds and 60 milliseconds is not much different for you and you can easily read it..The TCP // IP protocol itself is responsible for counteracting the impact of Jitter on networks. In networks used for VoIP communications, Jitter is very important, and if you send and receive data packets within 10 milliseconds. This delay should not be increased because the sound quality will be very low.<br />
The shorter the delay, the better the quality of your service. In fact, when you want to send information from point A to point B, this information is sent in the form of information packets from point A to B at regular intervals.An information packet may reach in 20 milliseconds and an information packet in 10 milliseconds, and the next one in 60 milliseconds and this delay time is<span style="text-decoration: underline;" class="mycode_u"> <span style="font-weight: bold;" class="mycode_b">Jitter</span></span>.<br />
<div style="text-align: center;" class="mycode_align"><hr class="mycode_hr" />
</div>
My purpose in posting this article was to help you understand the concept of Jitter in the shortest possible time.<br />
Do not doubt that this article will be useful for you in the future and I hope this article has been useful for you.<br />
If I haven't explained something and you know it, please teach us by sending a post in this thread. You can discuss in this thread.<br />
Thank you for reading my article. I'm a writer, but I publish all my articles on my website, and this is the first article I've published on post4vps forum. Please give me reputation if this article is helpful.<br />
good luck my friend's.<br />
<br />
<img src="https://post4vps.com/images/attachtypes/image.png" title="PNG Image" border="0" alt=".png" />
&nbsp;&nbsp;<a href="attachment.php?aid=227" target="_blank" title="">jitterlogo-post4vps-jittersoundlogo-jitterinfo-jitter.lookthat-HaMeD.png</a> (Size: 8.96 KB / Downloads: 31)
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[What is differances between default hosting and Offshore Hosting]]></title>
			<link>https://post4vps.com/Thread-What-is-differances-between-default-hosting-and-Offshore-Hosting</link>
			<pubDate>Fri, 10 Apr 2020 10:12:35 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=399">Pacific Spirit</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-What-is-differances-between-default-hosting-and-Offshore-Hosting</guid>
			<description><![CDATA[<span style="color: #222222;" class="mycode_color"><span style="font-size: xx-large;" class="mycode_size"><span style="font-family: Roboto Slab;" class="mycode_font"><span style="font-size: medium;" class="mycode_size">In this thread I like to talk about and to explain what Offshore hosting is for non-professionals.</span></span></span></span><br />
<br />
<span style="color: #222222;" class="mycode_color"><span style="font-size: xx-large;" class="mycode_size"><span style="font-family: Roboto Slab;" class="mycode_font">What is offshore hosting?</span></span></span><br />
<span style="color: #444444;" class="mycode_color"><span style="font-family: Raleway;" class="mycode_font">Offshore hosting is no ordinary hosting. Who chooses offshore hosting, chooses total privacy. What you do with your hosting package does not interest the host at all. The host doesn't care who you are. As long as you don't host child porn and pay the bill, you can have any kind of website or web service hosted.</span></span><br />
<span style="color: #444444;" class="mycode_color"><span style="font-size: medium;" class="mycode_size"><span style="font-family: Raleway;" class="mycode_font"><span style="font-size: medium;" class="mycode_size">[font=Raleway]<span style="color: #222222;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size">[font=Roboto Slab]ANONYMOUS WEB HOSTING ABROAD</span></span></span><br />
<img src="https://offshorehosting.nl/wp-content/uploads/2019/11/anonieme-webhosting-169x300.jpg" loading="lazy"  width="169" height="300" alt="[Image: anonieme-webhosting-169x300.jpg]" class="mycode_img" />If you want to set up a website or puppies, a regular web host is excellent. Some people don't have puppy websites, they choose a topic that is more controversial. People who keep a crime blog sometimes want to be completely anonymous. Someone who wants to maintain a torrent or usenet website also wants to be anonymous. Anonymous offshore hosting is very suitable for this type of people. It is almost impossible to find out who is behind such a website. Even the party that offers anonymous hosting does not know who their customer is. Even the domain name is bought anonymously and it is not possible to find out who the owner is.<br />
<span style="color: #222222;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-family: Roboto Slab;" class="mycode_font">PAYMENT FOR OFFSHORE HOSTING</span></span></span><br />
Anyone can open a hosting account. Go to a company like Versio or <a href="https://www.neostrada.nl/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #0274be;" class="mycode_color">Neostrada</span></a> and you can open an account. They do not ask for your ID proof and the data you enter will not be checked. However, the payment you make can be traced back to you. You use your own bank account, your PayPal account, or another payment method that can be linked to you.<br />
This works very differently for offshore hosting. You can almost always pay via cryptocurrency, in most cases Bitcoin. <a href="https://www.getmonero.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #0274be;" class="mycode_color">Monero</span></a> is an even more anonymous cryptocurrency than Bitcoin, which is very often accepted by companies that offer offshore hosting. Some people know little about cryptocurrency and therefore choose to pay with a <a href="https://www.paysafecard.com/nl-nl/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #0274be;" class="mycode_color">PaySafeCard</span></a> . A PaySafeCard is for sale at almost every AH supermarket and can therefore simply be bought without tracing it back to the buyer.<br />
Payment for anonymous hosting can therefore be completely anonymous. However, almost all offshore hosting providers also accept iDEAL, credit cards, debit cards, PayPal and other regular payment methods. So it just depends on how anonymous you want to be. If you don't even want the anonymous host to know who you are, you can choose to pay via cryptocurrency or a PaySaveCard.<br />
<span style="color: #222222;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-family: Roboto Slab;" class="mycode_font">WHAT DO YOU HOST?</span></span></span><br />
In principle, the host does not look at what you do with your hosting account. And, if people or organizations have complaints about your website, the host rarely does anything about it. A small torrent or usenet website and copyright infringement rarely interest an offshore host. But if you set up a website that openly offers drugs, weapons and other prohibited items, chances are the host will take you offline. Also websites that host child pornography are hardly ever tolerated. People who are involved in these matters do not look for regular or offshore hosting. They offer their mess on the <a href="https://nl.wikipedia.org/wiki/Dark_web" target="_blank" rel="noopener" class="mycode_url"><span style="color: #0274be;" class="mycode_color">dark web</span></a> , a part of the internet that is not easily accessible.[/font]</span>[/font]</span></span><br />
<span style="color: #444444;" class="mycode_color"><span style="font-size: medium;" class="mycode_size"><span style="font-family: Raleway;" class="mycode_font"><span style="font-size: medium;" class="mycode_size">[font=Raleway]<span style="font-size: large;" class="mycode_size">WHAT DO THE HOSTING PROVIDER?</span></span></span>[/font]</span></span><br />
<span style="color: #444444;" class="mycode_color"><span style="font-family: Raleway;" class="mycode_font">A hosting provider will not do anything about the website until there are many complaints about the reported domain name. Until then, the hosting provider will take no further action. Perhaps if the hosting provider gets complaints about RSA (Anti Fraud Command Center), the hosting provider will take action faster and perhaps take the website off the air.</span></span>]]></description>
			<content:encoded><![CDATA[<span style="color: #222222;" class="mycode_color"><span style="font-size: xx-large;" class="mycode_size"><span style="font-family: Roboto Slab;" class="mycode_font"><span style="font-size: medium;" class="mycode_size">In this thread I like to talk about and to explain what Offshore hosting is for non-professionals.</span></span></span></span><br />
<br />
<span style="color: #222222;" class="mycode_color"><span style="font-size: xx-large;" class="mycode_size"><span style="font-family: Roboto Slab;" class="mycode_font">What is offshore hosting?</span></span></span><br />
<span style="color: #444444;" class="mycode_color"><span style="font-family: Raleway;" class="mycode_font">Offshore hosting is no ordinary hosting. Who chooses offshore hosting, chooses total privacy. What you do with your hosting package does not interest the host at all. The host doesn't care who you are. As long as you don't host child porn and pay the bill, you can have any kind of website or web service hosted.</span></span><br />
<span style="color: #444444;" class="mycode_color"><span style="font-size: medium;" class="mycode_size"><span style="font-family: Raleway;" class="mycode_font"><span style="font-size: medium;" class="mycode_size">[font=Raleway]<span style="color: #222222;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size">[font=Roboto Slab]ANONYMOUS WEB HOSTING ABROAD</span></span></span><br />
<img src="https://offshorehosting.nl/wp-content/uploads/2019/11/anonieme-webhosting-169x300.jpg" loading="lazy"  width="169" height="300" alt="[Image: anonieme-webhosting-169x300.jpg]" class="mycode_img" />If you want to set up a website or puppies, a regular web host is excellent. Some people don't have puppy websites, they choose a topic that is more controversial. People who keep a crime blog sometimes want to be completely anonymous. Someone who wants to maintain a torrent or usenet website also wants to be anonymous. Anonymous offshore hosting is very suitable for this type of people. It is almost impossible to find out who is behind such a website. Even the party that offers anonymous hosting does not know who their customer is. Even the domain name is bought anonymously and it is not possible to find out who the owner is.<br />
<span style="color: #222222;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-family: Roboto Slab;" class="mycode_font">PAYMENT FOR OFFSHORE HOSTING</span></span></span><br />
Anyone can open a hosting account. Go to a company like Versio or <a href="https://www.neostrada.nl/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #0274be;" class="mycode_color">Neostrada</span></a> and you can open an account. They do not ask for your ID proof and the data you enter will not be checked. However, the payment you make can be traced back to you. You use your own bank account, your PayPal account, or another payment method that can be linked to you.<br />
This works very differently for offshore hosting. You can almost always pay via cryptocurrency, in most cases Bitcoin. <a href="https://www.getmonero.org/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #0274be;" class="mycode_color">Monero</span></a> is an even more anonymous cryptocurrency than Bitcoin, which is very often accepted by companies that offer offshore hosting. Some people know little about cryptocurrency and therefore choose to pay with a <a href="https://www.paysafecard.com/nl-nl/" target="_blank" rel="noopener" class="mycode_url"><span style="color: #0274be;" class="mycode_color">PaySafeCard</span></a> . A PaySafeCard is for sale at almost every AH supermarket and can therefore simply be bought without tracing it back to the buyer.<br />
Payment for anonymous hosting can therefore be completely anonymous. However, almost all offshore hosting providers also accept iDEAL, credit cards, debit cards, PayPal and other regular payment methods. So it just depends on how anonymous you want to be. If you don't even want the anonymous host to know who you are, you can choose to pay via cryptocurrency or a PaySaveCard.<br />
<span style="color: #222222;" class="mycode_color"><span style="font-size: large;" class="mycode_size"><span style="font-family: Roboto Slab;" class="mycode_font">WHAT DO YOU HOST?</span></span></span><br />
In principle, the host does not look at what you do with your hosting account. And, if people or organizations have complaints about your website, the host rarely does anything about it. A small torrent or usenet website and copyright infringement rarely interest an offshore host. But if you set up a website that openly offers drugs, weapons and other prohibited items, chances are the host will take you offline. Also websites that host child pornography are hardly ever tolerated. People who are involved in these matters do not look for regular or offshore hosting. They offer their mess on the <a href="https://nl.wikipedia.org/wiki/Dark_web" target="_blank" rel="noopener" class="mycode_url"><span style="color: #0274be;" class="mycode_color">dark web</span></a> , a part of the internet that is not easily accessible.[/font]</span>[/font]</span></span><br />
<span style="color: #444444;" class="mycode_color"><span style="font-size: medium;" class="mycode_size"><span style="font-family: Raleway;" class="mycode_font"><span style="font-size: medium;" class="mycode_size">[font=Raleway]<span style="font-size: large;" class="mycode_size">WHAT DO THE HOSTING PROVIDER?</span></span></span>[/font]</span></span><br />
<span style="color: #444444;" class="mycode_color"><span style="font-family: Raleway;" class="mycode_font">A hosting provider will not do anything about the website until there are many complaints about the reported domain name. Until then, the hosting provider will take no further action. Perhaps if the hosting provider gets complaints about RSA (Anti Fraud Command Center), the hosting provider will take action faster and perhaps take the website off the air.</span></span>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Accurate VPN/Proxy detection]]></title>
			<link>https://post4vps.com/Thread-Accurate-VPN-Proxy-detection</link>
			<pubDate>Sun, 29 Mar 2020 21:08:32 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=327">Decent12</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Accurate-VPN-Proxy-detection</guid>
			<description><![CDATA[<div style="text-align: justify;" class="mycode_align">Hello guys,<br />
I was just wondering which site API should i use for detection of proxy/VPNs as I am currently using this site -&gt; <a href="https://www.ipqualityscore.com/" target="_blank" rel="noopener" class="mycode_url">https://www.ipqualityscore.com/</a> but so far i noticed they are a little bit inaccurate and sometimes this site VPN detector API fails at some time.<br />
If you know any accurate VPN detection API site kindly tell me.</div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: justify;" class="mycode_align">Hello guys,<br />
I was just wondering which site API should i use for detection of proxy/VPNs as I am currently using this site -&gt; <a href="https://www.ipqualityscore.com/" target="_blank" rel="noopener" class="mycode_url">https://www.ipqualityscore.com/</a> but so far i noticed they are a little bit inaccurate and sometimes this site VPN detector API fails at some time.<br />
If you know any accurate VPN detection API site kindly tell me.</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[A Case for systemd-resolved  as the default DNS Resolver]]></title>
			<link>https://post4vps.com/Thread-A-Case-for-systemd-resolved-as-the-default-DNS-Resolver</link>
			<pubDate>Fri, 07 Feb 2020 11:52:43 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=1026">fChk</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-A-Case-for-systemd-resolved-as-the-default-DNS-Resolver</guid>
			<description><![CDATA[When I was trying to deploy my own DoH (DNS-over-HTTPS) server, I did have to rethink my DNS caching solution and finally settle for <span style="text-decoration: underline;" class="mycode_u">systemd-resolved</span> as my VPS's default resolver.<br />
<br />
<span style="font-size: large;" class="mycode_size">A Little Background</span><br />
<span style="text-decoration: underline;" class="mycode_u">systemd-resolved</span> is a stub resolver that is part of systemd; that's to say that it's already installed -by default- on your system if it's systemd-based. However, I can only attest that it's the case for RedHat-based systems (RHEL, CentOS and Fedora.)<br />
<br />
This little jewel of software implements a <span style="text-decoration: underline;" class="mycode_u">caching</span> and <span style="text-decoration: underline;" class="mycode_u">validating DNS/DNSSEC</span> stub resolver, as well as an LLMNR (<a href="https://tools.ietf.org/html/rfc4795" target="_blank" rel="noopener" class="mycode_url">Link-Local Multicast Name Resolution</a>) and MulticastDNS resolver and responder. Referring to it as a <span style="font-weight: bold;" class="mycode_b">stub resolver</span> means that it <span style="text-decoration: underline;" class="mycode_u">does not support recursive mode</span>.<br />
<br />
As part of systemd, it integrates with the system's <span style="text-decoration: underline;" class="mycode_u">NetworkManager</span>, so that it will automatically use the network-assigned DNS servers, unless overridden in its configuration file. This said, what has most tilted the balance in its favour for my use case, was its <span style="font-weight: bold;" class="mycode_b">supports for DNS-over-TLS</span> (DoT) out-of-the-box.<br />
<br />
Unfortunately, although my VPS is using the latest release and packages from CentOS repos (ie, CentOS Linux release 8.1.1911), the systemd version is still 239:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>[root@vps ~]# systemctl --version<br />
systemd 239<br />
(....)</code></div></div>.. which makes it only able to run DoT in an opportunistic mode.<br />
<br />
Compare this to Fedora 31:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>[root@vps ~]# systemctl --version<br />
systemd 243 (v243.5-1.fc31)<br />
(....)</code></div></div>.. which makes possible running DoT in the strict mode.<br />
<br />
A mini-timeline of systemd's supports for DNS over TLS:<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">version 236</span> DNSSEC support for RFC 8080 (ed25519 keys and signatures)<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">version 239</span> systemd-resolved now <span style="text-decoration: underline;" class="mycode_u">supports opportunistic</span> DNS-over-TLS, Off by default<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">version 243</span> systemd-resolved gained <span style="text-decoration: underline;" class="mycode_u">support for a new strict</span> DNS-over-TLS mode<br />
</li>
</ul>
<br />
<span style="font-size: large;" class="mycode_size">Configuration Tips</span><br />
systemd-resolved configuration file is located in /etc/systemd/resolved.conf and, for my use case, looks like this:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>#  This file is part of systemd.<br />
#  (..........)<br />
<br />
[Resolve]<br />
DNS=9.9.9.9<br />
FallbackDNS=1.1.1.1 8.8.8.8<br />
#Domains=<br />
LLMNR=no<br />
#MulticastDNS=yes<br />
DNSSEC=allow-downgrade<br />
DNSOverTLS=opportunistic<br />
#DNSOverTLS=yes<br />
Cache=yes<br />
#DNSStubListener=udp</code></div></div><br />
By setting the DNS directive, I'm overriding the DHCP's assigned DNS server, and I've disabled LLMNR for its uselessness and potential vulnerabilities in my case. The next big thing to note is that the Cache directive is activated (not set by default) and the DNSStubListener must be set to udp to activate the local DNS stub listener on the local loopback interface's IP address 127.0.0.53.<br />
<br />
To be clear, systemd-resolved's DoT in the opportunistic mode is unreliable, as both 53 and 853 traffics are used; so NO confidentiality assurance here!<br />
<br />
Now is the time to activate our DNS resolver:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code># starting the service<br />
systemctl start systemd-resolved<br />
#Permanently enabling the service<br />
systemctl enable systemd-resolved</code></div></div><br />
Testing using the deprecated netstat:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>netstat -tulpn|grep 53  <br />
udp        0      0 127.0.0.53:53         0.0.0.0:*         18478/systemd-resol</code></div></div>testing using the new ss command:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>ss -tuna | grep :53<br />
udp  UNCONN      0       0           127.0.0.53%lo:53             0.0.0.0:*</code></div></div><br />
<br />
Now, to let our local programs issuing DNS requests to this local DNS stub listener, we have to override the default /etc/resolv.conf<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>ln -fsv /usr/lib/systemd/resolv.conf /etc</code></div></div><br />
The content of this static resolv.conf is:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code># This file belongs to man:systemd-resolved(8). Do not edit.<br />
#<br />
# This is a static resolv.conf file for connecting local clients to the<br />
# internal DNS stub resolver of systemd-resolved. This file lists no search<br />
# domains.<br />
#<br />
# Run "resolvectl status" to see details about the uplink DNS servers<br />
# currently in use.<br />
#<br />
# Third party programs must not access this file directly, but only through the<br />
# symlink at /etc/resolv.conf. To manage man:resolv.conf(5) in a different way,<br />
# replace this symlink by a static file or a different symlink.<br />
#<br />
# See man:systemd-resolved.service(8) for details about the supported modes of<br />
# operation for /etc/resolv.conf.<br />
<br />
nameserver 127.0.0.53<br />
~                                                                                                                </code></div></div><br />
That should be it; all local clients that bypass local DNS APIs are connected to systemd-resolved.<br />
<br />
Next post will expand on the monitoring, operations and troubleshooting issues of systemd-resolved.<br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size">last Edited on 8/02/2020</span><br />
Fixed few typos, rephrased few sentences and added new content as code snippets.]]></description>
			<content:encoded><![CDATA[When I was trying to deploy my own DoH (DNS-over-HTTPS) server, I did have to rethink my DNS caching solution and finally settle for <span style="text-decoration: underline;" class="mycode_u">systemd-resolved</span> as my VPS's default resolver.<br />
<br />
<span style="font-size: large;" class="mycode_size">A Little Background</span><br />
<span style="text-decoration: underline;" class="mycode_u">systemd-resolved</span> is a stub resolver that is part of systemd; that's to say that it's already installed -by default- on your system if it's systemd-based. However, I can only attest that it's the case for RedHat-based systems (RHEL, CentOS and Fedora.)<br />
<br />
This little jewel of software implements a <span style="text-decoration: underline;" class="mycode_u">caching</span> and <span style="text-decoration: underline;" class="mycode_u">validating DNS/DNSSEC</span> stub resolver, as well as an LLMNR (<a href="https://tools.ietf.org/html/rfc4795" target="_blank" rel="noopener" class="mycode_url">Link-Local Multicast Name Resolution</a>) and MulticastDNS resolver and responder. Referring to it as a <span style="font-weight: bold;" class="mycode_b">stub resolver</span> means that it <span style="text-decoration: underline;" class="mycode_u">does not support recursive mode</span>.<br />
<br />
As part of systemd, it integrates with the system's <span style="text-decoration: underline;" class="mycode_u">NetworkManager</span>, so that it will automatically use the network-assigned DNS servers, unless overridden in its configuration file. This said, what has most tilted the balance in its favour for my use case, was its <span style="font-weight: bold;" class="mycode_b">supports for DNS-over-TLS</span> (DoT) out-of-the-box.<br />
<br />
Unfortunately, although my VPS is using the latest release and packages from CentOS repos (ie, CentOS Linux release 8.1.1911), the systemd version is still 239:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>[root@vps ~]# systemctl --version<br />
systemd 239<br />
(....)</code></div></div>.. which makes it only able to run DoT in an opportunistic mode.<br />
<br />
Compare this to Fedora 31:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>[root@vps ~]# systemctl --version<br />
systemd 243 (v243.5-1.fc31)<br />
(....)</code></div></div>.. which makes possible running DoT in the strict mode.<br />
<br />
A mini-timeline of systemd's supports for DNS over TLS:<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">version 236</span> DNSSEC support for RFC 8080 (ed25519 keys and signatures)<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">version 239</span> systemd-resolved now <span style="text-decoration: underline;" class="mycode_u">supports opportunistic</span> DNS-over-TLS, Off by default<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">version 243</span> systemd-resolved gained <span style="text-decoration: underline;" class="mycode_u">support for a new strict</span> DNS-over-TLS mode<br />
</li>
</ul>
<br />
<span style="font-size: large;" class="mycode_size">Configuration Tips</span><br />
systemd-resolved configuration file is located in /etc/systemd/resolved.conf and, for my use case, looks like this:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>#  This file is part of systemd.<br />
#  (..........)<br />
<br />
[Resolve]<br />
DNS=9.9.9.9<br />
FallbackDNS=1.1.1.1 8.8.8.8<br />
#Domains=<br />
LLMNR=no<br />
#MulticastDNS=yes<br />
DNSSEC=allow-downgrade<br />
DNSOverTLS=opportunistic<br />
#DNSOverTLS=yes<br />
Cache=yes<br />
#DNSStubListener=udp</code></div></div><br />
By setting the DNS directive, I'm overriding the DHCP's assigned DNS server, and I've disabled LLMNR for its uselessness and potential vulnerabilities in my case. The next big thing to note is that the Cache directive is activated (not set by default) and the DNSStubListener must be set to udp to activate the local DNS stub listener on the local loopback interface's IP address 127.0.0.53.<br />
<br />
To be clear, systemd-resolved's DoT in the opportunistic mode is unreliable, as both 53 and 853 traffics are used; so NO confidentiality assurance here!<br />
<br />
Now is the time to activate our DNS resolver:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code># starting the service<br />
systemctl start systemd-resolved<br />
#Permanently enabling the service<br />
systemctl enable systemd-resolved</code></div></div><br />
Testing using the deprecated netstat:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>netstat -tulpn|grep 53  <br />
udp        0      0 127.0.0.53:53         0.0.0.0:*         18478/systemd-resol</code></div></div>testing using the new ss command:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>ss -tuna | grep :53<br />
udp  UNCONN      0       0           127.0.0.53%lo:53             0.0.0.0:*</code></div></div><br />
<br />
Now, to let our local programs issuing DNS requests to this local DNS stub listener, we have to override the default /etc/resolv.conf<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code>ln -fsv /usr/lib/systemd/resolv.conf /etc</code></div></div><br />
The content of this static resolv.conf is:<br />
<div class="codeblock"><div class="title">Code:</div><div class="body" dir="ltr"><code># This file belongs to man:systemd-resolved(8). Do not edit.<br />
#<br />
# This is a static resolv.conf file for connecting local clients to the<br />
# internal DNS stub resolver of systemd-resolved. This file lists no search<br />
# domains.<br />
#<br />
# Run "resolvectl status" to see details about the uplink DNS servers<br />
# currently in use.<br />
#<br />
# Third party programs must not access this file directly, but only through the<br />
# symlink at /etc/resolv.conf. To manage man:resolv.conf(5) in a different way,<br />
# replace this symlink by a static file or a different symlink.<br />
#<br />
# See man:systemd-resolved.service(8) for details about the supported modes of<br />
# operation for /etc/resolv.conf.<br />
<br />
nameserver 127.0.0.53<br />
~                                                                                                                </code></div></div><br />
That should be it; all local clients that bypass local DNS APIs are connected to systemd-resolved.<br />
<br />
Next post will expand on the monitoring, operations and troubleshooting issues of systemd-resolved.<br />
<br />
<br />
<span style="font-size: medium;" class="mycode_size">last Edited on 8/02/2020</span><br />
Fixed few typos, rephrased few sentences and added new content as code snippets.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[DNS-over-HTTPS (DoH) can be easily detected and blocked]]></title>
			<link>https://post4vps.com/Thread-DNS-over-HTTPS-DoH-can-be-easily-detected-and-blocked</link>
			<pubDate>Wed, 25 Dec 2019 15:05:28 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=26">Mashiro</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-DNS-over-HTTPS-DoH-can-be-easily-detected-and-blocked</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-size: x-large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: blue;" class="mycode_color">DNS-over-HTTPS (DoH) can be easily detected and blocked</span></span></span><br />
Johannes B. Ullrich</div>
<br />
<br />
The security researcher <a href="https://www.sans.org/instructors/dr-johannes-ullrich" target="_blank" rel="noopener" class="mycode_url">Johannes B. Ullrich</a> has researched if and how DNS-over-HTTPS can be detected and broken or prevented from working WITHOUT the attempt to break the actual TLS connection. <br />
<br />
He has managed to do so by analyzing the DoH packets. His research shows that it is possible to detect DoH by size of the payload inside the packets. He has created two forum posts <a href="https://isc.sans.edu/forums/diary/Is+it+Possible+to+Identify+DNS+over+HTTPs+Without+Decrypting+TLS/25616/" target="_blank" rel="noopener" class="mycode_url">#1</a> and <a href="https://isc.sans.edu/forums/diary/More+DNS+over+HTTPS+Become+One+With+the+Packet+Be+the+Query+See+the+Query/25628/" target="_blank" rel="noopener" class="mycode_url">#2</a> at the ISC SANS forums where he is sharing and discussing his findings.<br />
<br />
In order to make it harder to detect DoH and solve this issue he suggests the use of EDNS padding. For this to work however all DoH servers have to be reconfigured to enable and support EDNS padding. In addition all clients need EDNS padding support, too. Mozilla has a discussion regarding this subject <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1543811" target="_blank" rel="noopener" class="mycode_url">here</a> already.<br />
<br />
Another blow to the rollout of DoH. Hopefully a fix will be found and applied soon if all the pro DoH candidates really care about DoH as much as they say. Surely someone will be unhappy while another party will be very happy.]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-size: x-large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: blue;" class="mycode_color">DNS-over-HTTPS (DoH) can be easily detected and blocked</span></span></span><br />
Johannes B. Ullrich</div>
<br />
<br />
The security researcher <a href="https://www.sans.org/instructors/dr-johannes-ullrich" target="_blank" rel="noopener" class="mycode_url">Johannes B. Ullrich</a> has researched if and how DNS-over-HTTPS can be detected and broken or prevented from working WITHOUT the attempt to break the actual TLS connection. <br />
<br />
He has managed to do so by analyzing the DoH packets. His research shows that it is possible to detect DoH by size of the payload inside the packets. He has created two forum posts <a href="https://isc.sans.edu/forums/diary/Is+it+Possible+to+Identify+DNS+over+HTTPs+Without+Decrypting+TLS/25616/" target="_blank" rel="noopener" class="mycode_url">#1</a> and <a href="https://isc.sans.edu/forums/diary/More+DNS+over+HTTPS+Become+One+With+the+Packet+Be+the+Query+See+the+Query/25628/" target="_blank" rel="noopener" class="mycode_url">#2</a> at the ISC SANS forums where he is sharing and discussing his findings.<br />
<br />
In order to make it harder to detect DoH and solve this issue he suggests the use of EDNS padding. For this to work however all DoH servers have to be reconfigured to enable and support EDNS padding. In addition all clients need EDNS padding support, too. Mozilla has a discussion regarding this subject <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1543811" target="_blank" rel="noopener" class="mycode_url">here</a> already.<br />
<br />
Another blow to the rollout of DoH. Hopefully a fix will be found and applied soon if all the pro DoH candidates really care about DoH as much as they say. Surely someone will be unhappy while another party will be very happy.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Google Search getting smarter or dumber ?]]></title>
			<link>https://post4vps.com/Thread-Google-Search-getting-smarter-or-dumber</link>
			<pubDate>Tue, 03 Dec 2019 22:37:10 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=461">rudra</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Google-Search-getting-smarter-or-dumber</guid>
			<description><![CDATA[firstly, I would like to apologize for such a title. Here I am going to present only one example which I found myself during my surfing. In it, DuckDuckGo search seems to be clearly ahead in ordering the results according to relevance and possible intent.<br />
<br />
i was looking for the updated versions of physics books called Karlsruhe physics course. I discovered that Google doesn't even show a link to that page on its first page of results. only a link to one pdf book and that too at the 8th position. I remember the English home page used to be at the top. Then i felt curious and went to DuckDuckGo. voila !! at the top.<br />
<br />
here are the pictures..<br />
<br />
<a href="https://ibb.co/hf9R25b" target="_blank" rel="noopener" class="mycode_url">DuckDuckGo</a><br />
<br />
<a href="https://ibb.co/HFDSkcx" target="_blank" rel="noopener" class="mycode_url">Google</a><br />
<br />
<a href="https://ibb.co/HFDSkcx" target="_blank" rel="noopener" class="mycode_url">Google bottom portion</a><br />
<br />
it seems in their search for relevance and accuracy and contextual signal and all that, employing AI and what not,they are returning some really poor results sometimes..<br />
<br />
This is just one example. But it makes me happy and hopeful, that may be other engines will get more of the share and loosen the grip with which Google is holding the market.<br />
<br />
Such a monopoly is not healthy. It gives them just too much power to control publicity and exposure. not good at all.<br />
<br />
please spread the word and ask people to use other search engines too.<br />
<br />
oh...i would love if you guys can come up with similar examples of your own and post them below. thanks]]></description>
			<content:encoded><![CDATA[firstly, I would like to apologize for such a title. Here I am going to present only one example which I found myself during my surfing. In it, DuckDuckGo search seems to be clearly ahead in ordering the results according to relevance and possible intent.<br />
<br />
i was looking for the updated versions of physics books called Karlsruhe physics course. I discovered that Google doesn't even show a link to that page on its first page of results. only a link to one pdf book and that too at the 8th position. I remember the English home page used to be at the top. Then i felt curious and went to DuckDuckGo. voila !! at the top.<br />
<br />
here are the pictures..<br />
<br />
<a href="https://ibb.co/hf9R25b" target="_blank" rel="noopener" class="mycode_url">DuckDuckGo</a><br />
<br />
<a href="https://ibb.co/HFDSkcx" target="_blank" rel="noopener" class="mycode_url">Google</a><br />
<br />
<a href="https://ibb.co/HFDSkcx" target="_blank" rel="noopener" class="mycode_url">Google bottom portion</a><br />
<br />
it seems in their search for relevance and accuracy and contextual signal and all that, employing AI and what not,they are returning some really poor results sometimes..<br />
<br />
This is just one example. But it makes me happy and hopeful, that may be other engines will get more of the share and loosen the grip with which Google is holding the market.<br />
<br />
Such a monopoly is not healthy. It gives them just too much power to control publicity and exposure. not good at all.<br />
<br />
please spread the word and ask people to use other search engines too.<br />
<br />
oh...i would love if you guys can come up with similar examples of your own and post them below. thanks]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Heads-Up: Firefox rolling DNS-over-HTTPS (DoH)]]></title>
			<link>https://post4vps.com/Thread-Heads-Up-Firefox-rolling-DNS-over-HTTPS-DoH</link>
			<pubDate>Mon, 11 Nov 2019 15:34:29 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=1026">fChk</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Heads-Up-Firefox-rolling-DNS-over-HTTPS-DoH</guid>
			<description><![CDATA[DNS-over-HTTPS (DoH) protocol improves security, performance and users privacy by letting people chose the name-server they want. In fact, DoH hides DNS queries inside regular HTTPS traffic thus any third-party 'sniffer' won't be able to see the DNS queries users are running thus inferring what websites they are about to visit; hence the security and privacy aspect of it.<br />
<br />
Firefox had (in 2017) the brilliant idea to start implementing it natively and with version 70, the feature is fully functional but still not enabled by default (read this article for more: <a href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/" target="_blank" rel="noopener" class="mycode_url">What’s next in making Encrypted DNS-over-HTTPS the Default</a>).<br />
<br />
&gt;&gt; A little personal note on this:<br />
I recently changed my ISP to an "underdog" company which happens to have a good 4G-LTE coverage in the different areas where I need it. But to my dismay, I've found that they are filtering out port 53 in such a way that any DNS query to any external nameserver (except theirs of course) is blocked!!!..<br />
<br />
I'm aware that there are 2/3 ways to circumvent this, using a VPN, SSH-tunneling, port-forwarding... and DNS-over-HTTPS.<br />
<br />
But When I learned about Firefox shipping DoH, I immediately enabled it thus improving the latency/performance (my new ISP DNS server is really that crappy), the Web browsing privacy ISP-wise (letting Cloudflare build that profile instead, for now. )<br />
<br />
Now, how you can enable DoH in Firefox; 2 ways:<br />
<br />
&gt; <span style="font-weight: bold;" class="mycode_b">about:preferences</span>  -&gt; Network Settings -&gt; Enable DNS over HTTPS (check)<br />
&gt; <span style="font-weight: bold;" class="mycode_b">about:config</span><br />
                    -&gt; network.trr.mode (2) <br />
                    -&gt; network.trr.uri<br />
                    -&gt; network.trr.bootstrapAddress<br />
<br />
See the Mozilla blog article for more on those settings or just <a href="https://blog.nightly.mozilla.org/2018/06/01/improving-dns-privacy-in-firefox/" target="_blank" rel="noopener" class="mycode_url">see here</a>.]]></description>
			<content:encoded><![CDATA[DNS-over-HTTPS (DoH) protocol improves security, performance and users privacy by letting people chose the name-server they want. In fact, DoH hides DNS queries inside regular HTTPS traffic thus any third-party 'sniffer' won't be able to see the DNS queries users are running thus inferring what websites they are about to visit; hence the security and privacy aspect of it.<br />
<br />
Firefox had (in 2017) the brilliant idea to start implementing it natively and with version 70, the feature is fully functional but still not enabled by default (read this article for more: <a href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/" target="_blank" rel="noopener" class="mycode_url">What’s next in making Encrypted DNS-over-HTTPS the Default</a>).<br />
<br />
&gt;&gt; A little personal note on this:<br />
I recently changed my ISP to an "underdog" company which happens to have a good 4G-LTE coverage in the different areas where I need it. But to my dismay, I've found that they are filtering out port 53 in such a way that any DNS query to any external nameserver (except theirs of course) is blocked!!!..<br />
<br />
I'm aware that there are 2/3 ways to circumvent this, using a VPN, SSH-tunneling, port-forwarding... and DNS-over-HTTPS.<br />
<br />
But When I learned about Firefox shipping DoH, I immediately enabled it thus improving the latency/performance (my new ISP DNS server is really that crappy), the Web browsing privacy ISP-wise (letting Cloudflare build that profile instead, for now. )<br />
<br />
Now, how you can enable DoH in Firefox; 2 ways:<br />
<br />
&gt; <span style="font-weight: bold;" class="mycode_b">about:preferences</span>  -&gt; Network Settings -&gt; Enable DNS over HTTPS (check)<br />
&gt; <span style="font-weight: bold;" class="mycode_b">about:config</span><br />
                    -&gt; network.trr.mode (2) <br />
                    -&gt; network.trr.uri<br />
                    -&gt; network.trr.bootstrapAddress<br />
<br />
See the Mozilla blog article for more on those settings or just <a href="https://blog.nightly.mozilla.org/2018/06/01/improving-dns-privacy-in-firefox/" target="_blank" rel="noopener" class="mycode_url">see here</a>.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Is our freedom of the Internet gone?]]></title>
			<link>https://post4vps.com/Thread-Is-our-freedom-of-the-Internet-gone</link>
			<pubDate>Sun, 04 Aug 2019 03:28:45 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://post4vps.com/member.php?action=profile&uid=917">deanhills</a>]]></dc:creator>
			<guid isPermaLink="false">https://post4vps.com/Thread-Is-our-freedom-of-the-Internet-gone</guid>
			<description><![CDATA[This thread was inspired by the announcement from HostLease about the EU requirement for ID.  Although I have a perfect understanding where that comes from, and I know Hostlease has to do it, it still makes me hot under the collar at the way things are moving with the Internet.  We no longer have the freedom we used to have.  And it's steadily getting worse and worse.<br />
<br />
We've just had a major successful hacking of a very large credit card corporation - Capital One - in Canada last week.  It involved millions of ID including social insurance numbers.  The hacking was done by a crazy IT lady from the States who said she did it just because she could.  She announced it in the social media and is now behind bars.  That to me means there must have been a vulnerability in Capital One's access system for a crazy person to have been able to hack it.  Luckily it doesn't look as though the info was sold, BUT, wow.  Where is this going to stop?  Like small people like us get to be shunted around by large corporations and governments to trust them with our personal details.  These days every one is living with plastic IDs and credit and debit cards that are provided as though that is regular and OK to do.  If one questions it, one is seen as "otherwise".  I'm otherwise!  I don't think the banking or any of the other corporations and governments care one iota about my safety and security.  It's all about control for their own agendas and it always ends up with their bottom line. It's cheap to do it this way. And if a large corporation or Government entity gets hacked, maybe that's good for them, as they now have an added excuse to put in more safety and controls, and demand more ID and compliance from every one else.  All in the name of safety and security.  For me the EU in Europe is a glorified police state.  Thank goodness I'm not living there!  But I don't think it is farfetched to think that what is happening in Europe is probably going to make its way to the rest of the world as Governments in other countries must be watching what the EU is doing with the Internet ID requirement.  WordPress, a US company has even all of the EU docs prepared in new WordPress installations.<br />
<br />
The dark net now seems to be looking attractive to me.  Where does one start with it?  Like can someone really savvy create a "safe zone" in the dark net where Governments and large corporations can't get their greedy fingers in?  <img src="https://post4vps.com/images/emoji/confused.png" alt="Confused" title="Confused" class="smilie smilie_13" />]]></description>
			<content:encoded><![CDATA[This thread was inspired by the announcement from HostLease about the EU requirement for ID.  Although I have a perfect understanding where that comes from, and I know Hostlease has to do it, it still makes me hot under the collar at the way things are moving with the Internet.  We no longer have the freedom we used to have.  And it's steadily getting worse and worse.<br />
<br />
We've just had a major successful hacking of a very large credit card corporation - Capital One - in Canada last week.  It involved millions of ID including social insurance numbers.  The hacking was done by a crazy IT lady from the States who said she did it just because she could.  She announced it in the social media and is now behind bars.  That to me means there must have been a vulnerability in Capital One's access system for a crazy person to have been able to hack it.  Luckily it doesn't look as though the info was sold, BUT, wow.  Where is this going to stop?  Like small people like us get to be shunted around by large corporations and governments to trust them with our personal details.  These days every one is living with plastic IDs and credit and debit cards that are provided as though that is regular and OK to do.  If one questions it, one is seen as "otherwise".  I'm otherwise!  I don't think the banking or any of the other corporations and governments care one iota about my safety and security.  It's all about control for their own agendas and it always ends up with their bottom line. It's cheap to do it this way. And if a large corporation or Government entity gets hacked, maybe that's good for them, as they now have an added excuse to put in more safety and controls, and demand more ID and compliance from every one else.  All in the name of safety and security.  For me the EU in Europe is a glorified police state.  Thank goodness I'm not living there!  But I don't think it is farfetched to think that what is happening in Europe is probably going to make its way to the rest of the world as Governments in other countries must be watching what the EU is doing with the Internet ID requirement.  WordPress, a US company has even all of the EU docs prepared in new WordPress installations.<br />
<br />
The dark net now seems to be looking attractive to me.  Where does one start with it?  Like can someone really savvy create a "safe zone" in the dark net where Governments and large corporations can't get their greedy fingers in?  <img src="https://post4vps.com/images/emoji/confused.png" alt="Confused" title="Confused" class="smilie smilie_13" />]]></content:encoded>
		</item>
	</channel>
</rss>