Skip to content
Locations
Pricing
Calculator
Affiliate
Blog
Documentation
Menu
Locations
Pricing
Calculator
Affiliate
Blog
Documentation
Dashboard
All Categories
About FiveM
About Load Balancer
Attack Types
Basics of HTTP
Basics of HTTPS
Beginner's Guide
Brand
Components
Content
DDoS Attack
Diagnosing Network Issues with MTR
DNS
DNS root servers
FAQ
Firewall
FiveM
FiveM DNS config
FiveM Protection Setup
Foundations
Getting Started
Minecraft DNS config
Minecraft Proxy Setup
OpenSSH
Patterns
Proxy Server
Proxy Setup
Resources
SA-MP
Samba
Setup DNS for Minecraft Proxy
SRV Load Balancing
SSH
SSH Clients
Start Crafting
Teamspeak 3 Protection Setup
To Hong Kong
To Lectron
To Singapore
To Vietnam
Traceroute To India
Troubleshooting
Tunnel Setup
Popular Search
fivem
tunnel
proxy
get
Getting Started
10
What is Lectron?
FAQ
Locations
Features
Billings
Getting started
How to use the Dashboard
Why is this called Armor?
How to Configure SRV Record Correctly
How to report high ping issues to Lectron?
Explore More
Beginner's Guide
11
What is the internet?
What is a proxy server?
How a DNS Server (Domain Name System) works
TCP vs. UDP Comparison
What is a server?
What is a DDoS attack?
What is a Firewall?
Protected: What is a port?
Proxy Protocol
What is TCP Protocol?
Explore More
Troubleshooting
9
High Latency and General Lag
Edge TLS
Ping and TraceRoute (tracert) commands
Understanding Network Address Translation (NAT)
What are SSL, TLS, HTTP and HTTPS?
Understanding IPv4 and IPv6
Understanding FTP (File Transfer Protocol)
What is Wireshark
Diagnosing Network Issues with MTR
Explore More
Attack Types
11
SYN Flood
TCP Half-Open
DNS Reflection Attack
Denial of Service explained
DDoS through DNS Requests
UDP Flood
Vulnerability Attack
Phishing Attacks
Common Security Threats
Ping of Death ICMP Attack
Explore More
DDoS Attack
4
what is DDoS attack?
Overview of DDoS attack.
Characteristics of DDoS attack
Protective Measures
Explore More
Firewall
1
what is Firewall?
Explore More