Skip to content
  • Features

    Protect

    FiveM Server DDoS Protection

    Let us drive your revenue forward

    Minecraft Server DDoS Protection

    Make your Game Servers load faster

    Anycast Proxy

    Performance and beyond

    Page Rules

    Advanced page rule system

    Load Balancing

    Scale websites reliability

    Edge Compute

    Vietnam

    Unleash Vietnam's Potential, deploy like local

    Web Application Firewall​

    Corporate-level WAF system

    DDoS Protection

    Prevent and detect all attacks

    SSL/TLS

    SSL certificates for all platforms

    Build Your Own Software

    With protected, integrated suite

    Make Money

    Multi-level Affiliate Program

    Become a Lectron Associate and get true profit sharing. It's FREE to sign up!

  • Locations
  • Pricing
  • Merchandise
  • Documentation
  • Blog
Dashboard
Getting Started

Getting Started

10
  • How to Configure SRV Record Correctly
  • What is Lectron?
  • Getting started
  • Why is this called Armor?
  • How to use the Dashboard
  • Locations
  • Features
  • FAQ
  • Billings
  • how to report high ping to lectron?
Troubleshooting

Troubleshooting

9
  • What is Wireshark
  • Diagnosing Network Issues with MTR
  • Understanding IPv4 and IPv6
  • What are SSL, TLS, HTTP and HTTPS?
  • Ping and TraceRoute (tracert) commands
  • High Latency and General Lag
  • Edge TLS
  • Understanding FTP (File Transfer Protocol)
  • Understanding Network Address Translation (NAT)
Beginner's Guide

Beginner's Guide

12
  • Proxy Protocol
  • What is UDP Protocol ?
  • What is TCP Protocol?
  • How to Configure SRV Record Correctly
  • What is the internet?
  • What is a Firewall?
  • TCP vs. UDP Comparison
  • Protected: What is a port?
  • What is a DDoS attack?
  • What is a server?
  • What is a proxy server?
  • How a DNS Server (Domain Name System) works
Attack Types

Attack Types

11
  • Common Security Threats
  • DDoS through DNS Requests
  • Denial of Service explained
  • SYN Flood
  • TCP Half-Open
  • UDP Flood
  • DNS Reflection Attack
  • Ping of Death ICMP Attack
  • Slowloris Attack
  • Vulnerability Attack
  • Phishing Attacks
DDoS Attack

DDoS Attack

4
  • what is DDoS attack?
  • Overview of DDoS attack.
  • Characteristics of DDoS attack
  • Protective Measures
Firewall

Firewall

1
  • what is Firewall?
  • Home
  • Docs
  • Troubleshooting

Troubleshooting

  • What is Wireshark
  • Diagnosing Network Issues with MTR
  • Understanding IPv4 and IPv6
  • What are SSL, TLS, HTTP and HTTPS?
  • Ping and TraceRoute (tracert) commands
  • High Latency and General Lag
  • Edge TLS
  • Understanding FTP (File Transfer Protocol)
  • Understanding Network Address Translation (NAT)
Metaverse Anti DDoS

Get ready to launch your metaverse to the cosmic guard with Lectron!

Start now →
Discord
Follow Lectron
Facebook Twitter Instagram Linkedin Youtube
Follow Viet York, founder of Lectron
Facebook Twitter Instagram Linkedin Medium Github Twitch
Features
  • Data Center Locations
  • Anycast Proxy
  • DDoS Protection
  • Load Balancing
  • Game Protection
  • Game Acceleration
  • Vietnam
  • Free SSL/TLS
Comparisons
  • Full Comparison Chart
Developers
  • Documentation
Community
  • Facebook
  • Twitter
  • Instagram
  • Discord
  • Facebook Group
Articles
  • Proxy DDoS Protection
Company
  • About Us
  • Careers
  • Our People
  • Success Stories
  • Enterprise
  • Contact Us
Legal
  • Terms
  • Privacy
  • DMCA
Trustpilot
Copyright © 2019-2021 Lectron, Inc. All Rights Reserved