Skip to content
  • Features

    Protect

    FiveM Server DDoS Protection

    Let us drive your revenue forward

    Minecraft Server DDoS Protection

    Make your Game Servers load faster

    Anycast Proxy

    Performance and beyond

    Page Rules

    Advanced page rule system

    Load Balancing

    Scale websites reliability

    Edge Compute

    Vietnam

    Unleash Vietnam's Potential, deploy like local

    Web Application Firewall​

    Corporate-level WAF system

    DDoS Protection

    Prevent and detect all attacks

    SSL/TLS

    SSL certificates for all platforms

    Build Your Own Software

    With protected, integrated suite

    Make Money

    Multi-level Affiliate Program

    Become a Lectron Associate and get true profit sharing. It's FREE to sign up!

  • Locations
  • Pricing
  • Merchandise
  • Documentation
  • Blog
Dashboard

Getting Started

  • How to Configure SRV Record Correctly
  • What is Lectron?
  • Getting started
  • Why is this called Armor?
  • How to use the Dashboard
  • Locations
  • Features
  • FAQ
  • Billings
  • how to report high ping to lectron?

Troubleshooting

  • What is Wireshark
  • Diagnosing Network Issues with MTR
  • Understanding IPv4 and IPv6
  • What are SSL, TLS, HTTP and HTTPS?
  • Ping and TraceRoute (tracert) commands
  • High Latency and General Lag
  • Edge TLS
  • Understanding FTP (File Transfer Protocol)
  • Understanding Network Address Translation (NAT)

Beginner's Guide

  • Proxy Protocol
  • What is UDP Protocol ?
  • What is TCP Protocol?
  • How to Configure SRV Record Correctly
  • What is the internet?
  • What is a Firewall?
  • TCP vs. UDP Comparison
  • Protected: What is a port?
  • What is a DDoS attack?
  • What is a server?
  • What is a proxy server?
  • How a DNS Server (Domain Name System) works

Start Crafting

  • Minecraft
  • Basic Commands
  • Craft Rules
  • How to play Minecraft – The Basic
  • How to Start
  • Understanding Hyperthreading in a Minecraft server

Brand

  • Mission
  • Personality
  • Promise
  • Values

Foundations

  • Accessibility
  • Color
  • Grid
  • Iconography
  • Illustrations
  • Logos
  • Typography
  • Images & Videos

Content

  • Inclusive language
  • Language and grammar
  • Messaging guidelines
  • Vocabulary
  • Voice and tone principles
  • Writing style

Components

  • Avatar
  • Avatar group
  • Badge
  • Banner
  • Breadcrumbs
  • Button
  • Checkbox
  • Code
  • Dropdown menu
  • Flag
  • Inline dialog
  • Inline message
  • Logo
  • Lozenge
  • Modal dialog
  • Pagination
  • Progress indicator
  • Progress tracker
  • Radio
  • Section message
  • Select
  • Spinner
  • Tabs
  • Tag
  • Text field
  • Toggle
  • Tooltip

Patterns

  • Benefits modal
  • First impressions
  • Forms
  • Inline edit
  • Messages
  • Page header
  • Spotlight

Resources

  • Color palettes
  • Design principles
  • Figma library
  • Fonts
  • Illustration library
  • Logo library
  • Protected: Presentation kit
  • Sketch library
  • Templates

Attack Types

  • Common Security Threats
  • DDoS through DNS Requests
  • Denial of Service explained
  • SYN Flood
  • TCP Half-Open
  • UDP Flood
  • DNS Reflection Attack
  • Ping of Death ICMP Attack
  • Slowloris Attack
  • Vulnerability Attack
  • Phishing Attacks

To Vietnam

  • OVH Singapore to FPT Vietnam
  • Vultr Singapore to FPT Vietnam
  • Hivelocity Hong Kong to Vietnam

Traceroute To India

  • FPT Hanoi to Tata India
  • Hivelocity New York City to Tata India
  • FPT Hanoi to Digital Ocean India

To Hong Kong

  • VNPT Ho Chi Minh City to Lectron Hong Kong
  • VNPT Hanoi to Leaseweb Hong Kong
  • Viettel Ho Chi Minh City to Lectron Hong Kong
  • Viettel Hanoi to Leaseweb Hong Kong
  • FPT Hanoi to Leaseweb Hong Kong

To Singapore

  • FPT Hanoi to Vultr Singapore
  • Hivelocity New York City to Vultr Singapore

To Lectron

  • Leaseweb Hong Kong to Lectron

FiveM Protection Setup

  • How to add Lectron proxy in server.cfg?
  • How to config FiveM Proxy in Lectron Dashboard?
  • How to Configure SRV Record Correctly
  • How to setup a free FiveM SRV record with Lectron (Domain / Subdomain)
  • Whitelist Lectron IP addresses to your FiveM server firewall
  • Use Lectron Dashboard to remote proxy your FiveM server
  • Protecting a Windows Server using a GRE Tunnel
  • Setup GRE Tunnel on Ubuntu 20 Linux Server

DDoS Attack

  • what is DDoS attack?
  • Overview of DDoS attack.
  • Characteristics of DDoS attack
  • Protective Measures

Tunnel Setup

  • Tunnel Setup for Windows Server with 1 public IP (beta)
  • Tunnel Setup for Ubuntu 20.04 or higher
  • Tunnel Setup on Ubuntu with interfaces file

SRV Load Balancing

  • How to Configure SRV Record Correctly
  • How to setup a free FiveM SRV record with Lectron (Domain / Subdomain)

Setup DNS for Minecraft Proxy

  • How to Configure SRV Record Correctly

Firewall

  • what is Firewall?

About Load Balancer

  • What is Load Balancer?
  • Load Balancer algorithm
  • Load Balancer components

About FiveM

  • Console commands
  • Installation
  • What is FiveM?

Teamspeak 3 Protection Setup

  • HOW TO PROTECT YOUR TEAMSPEAK 3?

SA-MP

  • How to connect your samp ip to domain?

Minecraft Proxy Setup

  • How to setup Bungeecord Minecraft Proxy?
  • How to setup Spigot Minecraft in Lectron Dashboard?

Proxy Server

  • What is proxy Server?
  • Types of Proxy Server

FiveM DNS config

  • Cloudflare DNS config for FiveM
  • Godaddy DNS config for FiveM
  • Google Domain DNS config for FiveM
  • Porkbun DNS config for FiveM

Minecraft DNS config

  • Cloudflare DNS config for Minecraft
  • Godaddy DNS config for Minecraft
  • Google domains DNS config for Minecraft
  • Porkbun DNS config for Minecraft

Basics of HTTP

  • What is HTTP?
  • What is the purpose of HTTP?
  • How does HTTP work?

Basics of HTTPS

  • What is HTTPS?
  • What is the purpose of HTTPS?
  • How does HTTPS work?
  • Home
  • Docs
  • Content
  • Messaging guidelines

Messaging guidelines

Table of Contents
  • Error Messages
  • Success Messages
  • Informational Messages

Use these guidelines for guidance on the correct replies to use when formatting a message.

For a further understanding on the importance of this, it is important to understand how the ability to grasp a client’s businesses can be made or broken based on how they are interacted with. Henceforth, poor messaging (i.e. Grammatical Errors, Rude Diction, etc.) can lead to the clients leaving; while proper messaging can cause the clients to stay.

Error Messages #

When formatting an error message, like when something isn’t correctly filled in, it is important to note the following to ensure the client doesn’t feel disrespected.

1. Do not dehumanize the client.

2. Explain briefly what happened and why that did.

3. Explain briefly how this error can be fixed.

4. Treat errors as opportunities to learn the correct way. 

Don’t: No account matching this user found.

Do: We were unable to find you in our system.

To summarize, clients like to know why something happened and how to fix it. Instead of just saying something like, Incorrect Password, it might be better to say, Incorrect Password – Please reset your password by clicking on Forgot Password.

Success Messages #

As anyone else would have the same feeling of a success message appearing, we aim to make the client feel as though they truly accomplished something that they can be proud of.

With that we try to ensure the client feels the following ways when they see the success message:

1. Empowered – Did something they can be proud of.

2. Motivated – Ready to continue attacking the task.

3. Determined – Looking to bring change to those around them.

Informational Messages #

With all messages that are going to be guidance based on the information the client will perceive, we aim to have them teach rather than command.

For further clarification, it is the goal for us to clear to the client why they are reading this message. With that, we try to ensure that the message achieves the following:

1. Clear and Concise – Straight to the point.

2. Allow the client to understand easily why they are seeing this.

3. Use common words/phrases that are understood by all.

Do: Are you still there? We logged you out to ensure your account safety.Don’t: Logged Out. Due to our safety measures we have added to the firewalls your account has been automatically closed as you went AFK for an extended period of time.

How do you feel about this documentation?
Share This Article :
  • Facebook
  • Twitter
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on March 27, 2021
Language and grammarVocabulary

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Table of Contents
  • Error Messages
  • Success Messages
  • Informational Messages
Metaverse Anti DDoS

Get ready to launch your metaverse to the cosmic guard with Lectron!

Start now →
Discord
Follow Lectron
Facebook Twitter Instagram Linkedin Youtube
Follow Viet York, founder of Lectron
Facebook Twitter Instagram Linkedin Medium Github Twitch
Features
  • Data Center Locations
  • Anycast Proxy
  • DDoS Protection
  • Load Balancing
  • Game Protection
  • Game Acceleration
  • Vietnam
  • Free SSL/TLS
Comparisons
  • Full Comparison Chart
Developers
  • Documentation
Community
  • Facebook
  • Twitter
  • Instagram
  • Discord
  • Facebook Group
Articles
  • Proxy DDoS Protection
Company
  • About Us
  • Careers
  • Our People
  • Success Stories
  • Enterprise
  • Contact Us
Legal
  • Terms
  • Privacy
  • DMCA
Trustpilot
Copyright © 2019-2021 Lectron, Inc. All Rights Reserved