Category: Network
DNS Privacy Protection and User Profiling Prevention Strategies
Focusing on DNS queries and user profiling construction, starting from principles and risks, this article elaborates on feasible privacy protection strategies and considerations based on public standards and materials, avoiding speculative evaluations and hands-on operations.
Categories:
Comparison of DNS Encryption Protocols: DoT, DoH, DoQ
A comparison of Plain DNS, DoT, DoH, and DoQ, covering their layered relationships, ports, performance differences, and suitable scenarios, with practical selection and configuration advice.
Categories:
WSL Mirrored Network Mode Configuration Guide
WSL 2.6.0 networking upgrade configuration guide
Categories:
Using Common DDNS Subdomains May Cause China Telecom Broadband Service Degradation
Categories:
Compliance Discussion of Reverse Proxy in Home Networks
Exploring potential compliance issues and solutions when using reverse-proxy services on home broadband
Categories:
How a vendor bypasses DNS blocking
Categories:
Low-Risk Web Crawling Behavior Analysis: Benefits and Strategies
In-depth analysis of the legal risks, ethical considerations, and best practice strategies for web crawling, exploring how to realize data value while staying compliant