Technitium DNS Server
namecoin.org
Technitium DNS Server | namecoin.org | |
---|---|---|
100 | 11 | |
3,496 | 17 | |
2.9% | - | |
9.6 | 6.4 | |
14 days ago | 3 days ago | |
C# | HTML | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Technitium DNS Server
-
Runs on your OpenWrt box: AdGuard Home is network-wide blocking ads and tracking
It works on minimal hardware. I am running it on an Orange Pi 3 LTS.
https://technitium.com/dns/
- Technitium DNS Server: Self host a DNS server for privacy and security
-
A simple backup script
#!/bin/bash # Check input file if [ $# -eq 0 ]; then echo "Usage: $0 " exit 1 fi # Configurable value for zip file suffix SUFFIX="daily" # Get input file DNS_FILE=$1 # Read lines while read -r line; do HOSTNAME=$(echo $line | cut -d',' -f1) IP=$(echo $line | cut -d',' -f2) TOKEN=$(echo $line | cut -d',' -f3) # Construct API URL with IP and token, change any unwanted settings below to false as documented in https://github.com/TechnitiumSoftware/DnsServer/blob/master/APIDOCS.md#backup-settings URL="http://$IP:5380/api/settings/backup?token=$TOKEN&blockLists=true&logs=true&scopes=true&apps=true&stats=true&zones=true&allowedZones=true&blockedZones=true&dnsSettings=true&logSettings=true&authConfig=true" # Construct output file name FILE_NAME=$HOSTNAME-$IP-$(date +%Y%m%d)-$SUFFIX.zip # Call API curl -o $FILE_NAME $URL done < $DNS_FILE
-
Overwatch 2 disconnects when using Windows Server 2022 for DHCP/DNS
You can try using a DNS/DHCP server other than the Windows one, e.g. Technitium I use this on Linux but as it is written in Dotnet it will of course also work on Windows https://technitium.com/dns/
-
Has anyone been able to set up dockerized CrowdSec in front of dockerized NPM using official images only?
I recently made an effort to harden my network due to (technically) exposing more of it with FireZone (WireGuard). For the curious, I shared some details in a recent comment. I didn't mention it in the comment, but I also set up local DNS (Technitium) with block lists.
- Self hosted DNS solution
-
User security and access
Thanks for asking. There is already a feature request on Github for it. It is not planned to be implemented for now since there are some core features that are prioritized to be implemented. But it should come later once the planned features are implemented.
-
Technitium DNS Server v11.3 Released!
See what's new in this release: https://github.com/TechnitiumSoftware/DnsServer/blob/master/CHANGELOG.md
-
Gravity - A new, open source DNS/DHCP server with Adblocking and inbuilt config replication
How would this compare to https://technitium.com/dns/?
-
On what side project you guys are working on?
I am working on open source DNS server project since a few years adding features to it whenever I get time: https://github.com/TechnitiumSoftware/DnsServer
namecoin.org
-
Namecoin in practice tutorial, cheap domain for everyone
it should be on https://www.namecoin.org
-
Response to 'Call for Review: Decentralized Identifiers (DIDs) v1.0'
Is someone going to reinvent Namecoin¹ and IPFS's IPNS²?
At least the abstract of the spec reads like that to me:
> Abstract
> Decentralized identifiers (DIDs) are a new type of identifier that enables verifiable, decentralized digital identity. A DID refers to any subject (e.g., a person, organization, thing, data model, abstract entity, etc.) as determined by the controller of the DID. In contrast to typical, federated identifiers, DIDs have been designed so that they may be decoupled from centralized registries, identity providers, and certificate authorities. Specifically, while other parties might be used to help enable the discovery of information related to a DID, the design enables the controller of a DID to prove control over it without requiring permission from any other party. DIDs are URIs that associate a DID subject with a DID document allowing trustable interactions associated with that subject.
> Each DID document can express cryptographic material, verification methods, or services, which provide a set of mechanisms enabling a DID controller to prove control of the DID. Services enable trusted interactions associated with the DID subject. A DID might provide the means to return the DID subject itself, if the DID subject is an information resource such as a data model.
> This document specifies the DID syntax, a common data model, core properties, serialized representations, DID operations, and an explanation of the process of resolving DIDs to the resources that they represent.
[ Source: https://www.w3.org/TR/did-core/ ]
¹ https://www.namecoin.org/
- TIL the entire internet can be shut down by a group of 7-14 cybersecurity experts — the group was created by ICANN to protect people from global internet security issues.
-
CRYPTO HISTORY: The first ever Altcoin
The first ever Altcoin was created 10 years ago (2011) and was a fork of Bitcoin, called Namecoin.
-
Yes, the domain was expensive. Roughly $1.5m. We consider it an asset that is unlikely to depreciate significantly.
oh something like this?
-
Decentralized Crypto Domain
The research is undermined somewhat by the omission of Namecoin[1], launched back in 2013, still being developed [2] and ironically, listed on coingecko [3].
[1] https://www.namecoin.org/
-
Alternatives to Google's Public DNS servers (and to your ISP services too)
The OpenNIC project. Free. Offers multiple servers in several regions. Proects against DNS hijacking. Namecoin. A distributed domain name system based on Bitcoin.
-
Viability of unseizable blockchain-based domains
I remember when Namecoin debuted that concept 10 years ago. It almost makes me want to see if I can find my old Namecoin wallet. Almost.
-
Dear EU: Please Don't Ruin the Root
Browsers could alternatively ship with support for Namecoin [1] or Unstoppable Domains [2]. Though, realistically, I'm suggesting Opera or Brave. Mozilla isn't functionally capable of thinking about doing something like that, and I don't think I have to suggest a reason why the other browser vendor wouldn't entertain the idea.
[1] https://www.namecoin.org/
[2] https://unstoppabledomains.com/
-
Namecoin.org now available via Tor onion service and ZeroNet
The Namecoin website is now available via both Tor onion service and ZeroNet. Links are in the footer of all pages on the site.
What are some alternatives?
Pi-hole - A black hole for Internet advertisements
ens - Implementations for ENS core functionality: The registry, registrars, and public resolvers.
awesome-selfhosted - A list of Free Software network services and web applications which can be hosted on your own servers
datamodels - A collection of data models used by Ceramic applications
PowerDNS-Admin - A PowerDNS web interface with advanced features
bisq - A decentralized bitcoin exchange network
Cockpit - Cockpit is a web-based graphical interface for servers.
libcurl - A command line tool and library for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, GOPHERS, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, MQTT, POP3, POP3S, RTMP, RTMPS, RTSP, SCP, SFTP, SMB, SMBS, SMTP, SMTPS, TELNET, TFTP, WS and WSS. libcurl offers a myriad of powerful features
nextdns - NextDNS CLI client (DoH Proxy)
universal-resolver - Universal Resolver implementation and drivers.
dns-server-setup - Ansible playbook to easily deploy new, fully configured, DNS servers.
DyName - VECLabs DyName: Namecoin Dynamic DNS Client