About:

The author of the website blog.daknob.net, known as daknob, is likely a tech enthusiast or professional who writes about topics related to technology, security, and possibly software development. The content may focus on responsible disclosure and other tech-related subjects.

Website:

Incoming Links:

Subscribe to RSS:
The text discusses the use of VyOS, a free Linux-based distribution, to create a fully-featured router. It provides a detailed guide on setting up a VyOS router to connect to an ISP, receive IPv4 and IPv6 addresses, create VLANs, ...
The text discusses the need for IPv4 in today's access networks, explaining that it is not really needed except for LANs with devices that do not support IPv6. It goes over the current state of the art for removing IPv4 networking...
The text discusses the process of deploying fiber in a home, including the building structure, cable design, fiber types, connectors, and testing. The author documents the process of upgrading existing wiring in their home and pro...
The text discusses the use of X.509 certificates for TLS encryption, focusing on single-domain and multi-SAN certificates. It explains the differences, costs, and benefits of each type, and provides insights into the impact on ban...
The text discusses the importance of Internet Exchange Points (IXPs) and the potential security risks associated with them. It highlights the need for network engineers to pay attention to the features enabled and configuration be...
The text introduces TP, a piece of software that acts as a Zero Trust Secure Proxy. It explains how TP works, its features, and its integration with QUIC and WebTransport. The author discusses the use cases of TP, such as SSH conn...
The post discusses the importance of not blindly moving to password resets and calls for 2FA after a data breach. It emphasizes the need to understand how attackers gained access, patch all issues, and rebuild the system from scra...
The text discusses the L3 Hardware Offload feature added to MikroTik CRS326 with the release of RouterOS 7.1. It explains the process of routing packets, the limitations of the switch, and the performance of the device. The author...
The author describes the challenges of obtaining end-user client certificates for laptops to connect to services, and the creation of new challenges to address this issue. The author discusses the development of YubiKey challenges...
The text discusses the use of ACME, a protocol for automatically issuing certificates, to automate workload-level TLS for securing service to service communication in a Kubernetes cluster. The author also describes the challenges ...
The text discusses the need for a scalable OCSP responder and the challenges in serving revocation information to clients. It explains the differences between CRL and OCSP, the challenges in serving OCSP, and the use of Cloudflare...
The text discusses the challenges of IP geolocation and provides a guide for ISPs to fix the problem. It covers issues with obtaining accurate location data, databases, monitoring, submitting correction reports, proactive informat...
The text explains how AirPrint and AirScan work, and how to enable printing across different networks using mDNS repeaters, search domains, and DNS records. It also addresses common questions and concerns about security and compat...
The text is a detailed guide on configuring COSMOTE VoIP on a PBX. The author shares their experience of setting up their own PBX and moving their phone number to this service. They provide step-by-step instructions on setting up ...
The text discusses the history and current usage of the IPv4 block 44/8, originally allocated to radio amateurs for experimentation. It covers the sale of a quarter of the addresses to Amazon Web Services, the sub-allocations to t...
The text discusses the rise of cryptocurrency theft and the author's experiment of 'losing' Bitcoin wallets on the internet to observe what would happen. The author created 10 wallets, disseminated their QR codes on various platfo...
The author visited the 36th Annual CCC event, 36C3, in Leipzig, Germany, and monitored the event IP space using the same tools and methodology learned from a previous blog post on mapping the Greek Internet. The event had an amazi...
The author attended RIPE79 in Rotterdam and discussed the issue of IP space utilization with another person. They were unable to find a solution to the problem. The author then decided to map the Greek Internet using a methodology...
The text provides an academic profile and a list of peer-reviewed publications of Antonios A. Chariton, an undergraduate student at the Computer Science Department of the University of Crete. It includes links to his profile on Go...

0Contact Information

2019-10-05

...