fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

9.9K
active users

#proxy

8 posts6 participants0 posts today

3 Easy Steps to Integrate Monitoring Tools for #Apache Reverse #Proxy Server

This article provides a step-by-step guide to integrate monitoring tools for Apache reverse proxy server. Integrating monitoring tools with your Apache reverse proxy server setup allows you to track performance, detect issues, and optimize your infrastructure efficiently.
How to Integrate Monitoring Tools for Apache Reverse Proxy Server
Below, ...
Continued 👉 blog.radwebhosting.com/3-easy- #reverseproxy #proxyserver

3 Easy Steps to Integrate Monitoring Tools for Apache Reverse Proxy Server
RadWeb, LLC · 3 Easy Steps To Integrate Monitoring Tools For Apache Reverse Proxy Server - VPS Hosting Blog | Dedicated Servers | Reseller HostingThis article provides a step-by-step guide to integrate monitoring tools for Apache reverse proxy server. Integrating monitoring tools with your Apache

Je suis pas un gros "viewer" sur Twitch, mais quand je peux, je regarde #Proxy d'@arretsurimages.

Là, suis dèg', j'ai raté celui du 1er avril en live, mais on le peut voir replay.

Ça parle du rapport sur la pub qui a fuité après avoir "calé une table" quelques mois dans le bureau du 1er ministre.

J'aime bien que @lorisguemart rappelle, à chaque fois qu'il aborde l'ARPP, que c'est une association et pas une "Autorité" 🙏.

(c'est d'ailleurs rappelé dans ledit rapport)

arretsurimages.net/articles/cl

www.arretsurimages.netClimat : un rapport "explosif" veut interdire des pubs, les médias peu intéressés - Par Loris Guémart | Arrêt sur imagesLa critique média en toute indépendance : enquêtes, analyses, chroniques et émissions.

Latest Mustang Panda Arsenal: Toneshell, StarProxy, PAKLOG, CorKLOG, and SplatCloak

Mustang Panda, a threat actor group, has developed new tools including two keyloggers (PAKLOG and CorKLOG) and an EDR evasion driver (SplatCloak). PAKLOG monitors keystrokes and clipboard data, using a custom encoding scheme. CorKLOG captures keystrokes, encrypts data with RC4, and establishes persistence through services or scheduled tasks. SplatCloak disables kernel-level notification callbacks for Windows Defender and Kaspersky drivers, employing obfuscation techniques like control flow flattening and mixed boolean arithmetic. Along with those tools, the group has been observed using updated versions of ToneShell and a new tool called StarProxy. ToneShell, a backdoor, now features changes in its FakeTLS C2 communication protocol and client identifier storage methods. StarProxy, a lateral movement tool, uses the FakeTLS protocol to proxy traffic and facilitate attacker communications.

Pulse ID: 6800148cd0bb0e7851cc6218
Pulse Link: otx.alienvault.com/pulse/68001
Pulse Author: AlienVault
Created: 2025-04-16 20:35:24

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Inside BRUTED: Black Basta (RaaS) Used Automated Brute Forcing Framework to Target Edge Network Devices

Black Basta, a ransomware-as-a-service group, has been using an automated brute forcing framework called BRUTED to target edge network devices since 2023. The framework performs internet scanning and credential stuffing against firewalls and VPN solutions in corporate networks. Black Basta prioritizes high-impact industries, particularly the Business Services sector, to amplify operational disruptions. The group's internal communications were leaked, exposing their infrastructure and operational details. BRUTED targets various remote-access and VPN solutions, using proxy rotation, credential generation, and distributed execution to scale attacks. Black Basta exploits vulnerabilities in edge devices for initial access, then targets ESXi hypervisors to encrypt file systems and disrupt virtual machines, maximizing operational impact and ransom leverage.

Pulse ID: 67ffc3faf1eadb11b97d2f1b
Pulse Link: otx.alienvault.com/pulse/67ffc
Pulse Author: AlienVault
Created: 2025-04-16 14:51:38

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Install and Configure #SOCKS #Proxy Server on Rocky Linux VPS

This article provides a guide for how to install and configure SOCKS proxy server on Rocky Linux VPS.

In this tutorial, we'll go through the process of installing and configuring a SOCKS proxy server on a Rocky Linux VPS. We will also discuss enabling SSH tunnelling from a PC using the SOCKS proxy server. This will allow you to route your ...
Continued 👉 blog.radwebhosting.com/install #installguide #proxyserver #vpsguide #rockylinux

How to Install and Configure SOCKS Proxy Server on Rocky Linux VPS
RadWeb, LLC · Install And Configure SOCKS Proxy Server On Rocky Linux VPS - VPS Hosting Blog | Dedicated Servers | Reseller HostingThis article provides a guide for how to install and configure SOCKS proxy server on Rocky Linux VPS.

Cloudflare Workers 提供的 MySQL/MariaDB 方案

在「Build global MySQL apps using Cloudflare Workers and Hyperdrive」這邊看到 Cloudflare 提供了 Cloudflare Workers 使用 MySQL/MariaDB 的方案。 本來以為是做出了 replicated globally 的系統,還在想要怎麼處理 ACID 問題,花了點時間看完才發現是弄出了一個類似 ProxySQL 的架構,最終還是要連回某個區域的 MySQL 主機上,可能是 AWS、GCP、Azure 或是自己的 MySQL 伺服器: Now, you can create new Hyperdrive c…

blog.gslin.org/archives/2025/0

Gea-Suan Lin's BLOG · Cloudflare Workers 提供的 MySQL/MariaDB 方案在「Build global MySQL apps using Cloudflare Workers and Hyperdrive」這邊看到 Cloudflare 提供了 Cloudflare Workers 使用 MySQL/MariaDB 的方案。 本來以為是做出了 replicated globally 的系統,還在想要怎麼處理 ACID 問題,花了點時間看完才發現是弄出了一...

How to Setup a Reverse #Proxy with HTTPS Using #Nginx and #Certbot (5 Minute Quick-Start Guide)

This article outlines how to setup a reverse proxy with HTTPS using Nginx and Certbot.
What is a Reverse Proxy?
A reverse proxy is a server that sits between client devices and a backend server, forwarding client requests to the backend server and returning the server's response to the clients. Unlike a forward proxy, ...
Continued 👉 blog.radwebhosting.com/how-to- #reverseproxy #proxyserver #letsencrypt

How to Setup a Reverse Proxy with HTTPS Using Nginx and Certbot
RadWeb, LLC · How To Setup A Reverse Proxy With HTTPS Using Nginx And Certbot (5 Minute Quick-Start Guide) - VPS Hosting Blog | Dedicated Servers | Reseller HostingThis article outlines how to setup a reverse proxy with HTTPS using Nginx and Certbot.

Proxyserver für die Verbindung mit WhatsApp einrichten
In einigen Regionen auf der Welt werden Menschen von der Nutzung von WhatsApp ausgeschlossen. Freiwillige Helfer*innen und Organisationen können Proxyserver einrichten, damit diese Menschen wieder auf WhatsApp zugreifen und frei und sicher kommunizieren können.

Um Menschen eine Ve
blog.retronerd.at/proxyserver-
#2004 #2204 #docker #tutorial #ubuntu #2204 #2404 #docker #proxy #tutorial #ubuntu #whatsapp

blog.retronerd.at · Proxyserver für die Verbindung mit WhatsApp einrichten - blog.retronerd.at
More from SchiWaGoA

Just released: #swad v0.2

SWAD is the "Simple Web Authentication Daemon", meant to add #cookie #authentication with a simple #login form and configurable credential checker modules to a reverse #proxy supporting to delegate authentication to a backend service, like e.g. #nginx' "auth_request". It's a very small piece of software written in pure #C with as little external dependencies as possible. It requires some #POSIX (or "almost POSIX", like #Linux, #FreeBSD, ...) environment, OpenSSL (or LibreSSL) for TLS and zlib for response compression.

Currently, the only credential checker module available offers #PAM authentication, more modules will come in later releases.

swad 0.2 brings a few bugfixes and improvements, especially helping with security by rate-limiting the creation of new sessions as well as failed login attempts. Read details and grab it here:

github.com/Zirias/swad/release

New features:

Configurable rate-limits for new session creation
Configurable rate-limits for failed login attempts (per session, realm
and user name)
Configurable types of proxy headers (X-Forward...
GitHubRelease swad 0.2 · Zirias/swadNew features: Configurable rate-limits for new session creation Configurable rate-limits for failed login attempts (per session, realm and user name) Configurable types of proxy headers (X-Forward...

New blog post 📝

𝐂𝐨𝐧𝐟𝐢𝐠𝐮𝐫𝐢𝐧𝐠 𝐀𝐒𝐏.𝐍𝐄𝐓 𝐂𝐨𝐫𝐞 𝐅𝐨𝐫𝐰𝐚𝐫𝐝𝐞𝐝 𝐇𝐞𝐚𝐝𝐞𝐫𝐬 𝐌𝐢𝐝𝐝𝐥𝐞𝐰𝐚𝐫𝐞

Running ASP.NET Core behind a proxy?

Then you need to configure ForwardedHeadersMiddleware the right way.
✅ Trust proxy IPs
✅ Handle X-Forwarded-* headers
✅ Avoid broken IPs, schemes & hosts

Read it 👉 nestenius.se/net/configuring-a

Запускаем Openwrt в виртуалке с отдельным адресом и socks прокси на Apple silicon

Запуск OpenWRT в виртуальной машине на macOS с отдельным IP-адресом и SOCKS-прокси В этой статье мы покажем, как запустить OpenWRT в виртуальной машине на macOS, используя бесплатный UTM и Apple Virtualization Framework — для экономии ресурсов и удобства. OpenWRT получает собственный IP-адрес через bridge-интерфейс, а SOCKS-прокси служит лишь примером одного из возможных применений виртуального роутера. Остальное — дело вашей фантазии.

habr.com/ru/articles/898880/

ХабрЗапускаем Openwrt в виртуалке с отдельным адресом и socks прокси на Apple siliconOpenwrt в UTM с использованием Apple Virtualization Framework и Bridge адаптера для WAN О чем этот текст В этом тексте мы разберем, как создать виртуалку с Openwrt и собственным виртуальным сетевым...

How ToddyCat tried to hide behind AV software

The ToddyCat APT group has developed a sophisticated tool called TCESB to stealthily execute payloads and evade detection. This tool exploits a vulnerability (CVE-2024-11859) in ESET Command line scanner for DLL proxying, using a modified version of the open-source EDRSandBlast malware. TCESB employs techniques like DLL proxying, kernel memory manipulation, and Bring Your Own Vulnerable Driver (BYOVD) to bypass security solutions. It searches for kernel structure addresses using CSV or PDB files, installs a vulnerable Dell driver, and decrypts AES-128 encrypted payloads. The discovery highlights the need for monitoring driver installations and Windows kernel debug symbol loading events to detect such sophisticated attacks.

Pulse ID: 67f3cb12758e286216442770
Pulse Link: otx.alienvault.com/pulse/67f3c
Pulse Author: AlienVault
Created: 2025-04-07 12:54:42

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Как настроить персональный VPN

Как поднять свой VPN? Зачем я вообще решил сделать свой VPN? 1. Я хочу быть уверен, что никто не пишет логи и не знает куда и что я отправил. 2. Я могу пользоваться ВПН без ограничений на количество устройств, скорости и объема траффика. 3. Если скинуться группой, то выйдет дешевле. Что же, приступим к запуску персонального VPN. Расскажу как это делал я:

habr.com/ru/articles/898154/

ХабрКак настроить персональный VPNКак поднять свой VPN? Зачем я вообще решил сделать свой VPN? 1. Я хочу быть уверен, что никто не пишет логи и не знает куда и что я отправил. 2. Я могу пользоваться ВПН без ограничений на количество...
#vpn#proxy#впн