Skip to content
  • Features

    Protect

    FiveM Server DDoS Protection

    Let us drive your revenue forward

    Minecraft Server DDoS Protection

    Make your Game Servers load faster

    Anycast Proxy

    Performance and beyond

    Page Rules

    Advanced page rule system

    Load Balancing

    Scale websites reliability

    Edge Compute

    Vietnam

    Unleash Vietnam's Potential, deploy like local

    Web Application Firewall​

    Corporate-level WAF system

    DDoS Protection

    Prevent and detect all attacks

    SSL/TLS

    SSL certificates for all platforms

    Build Your Own Software

    With protected, integrated suite

    Make Money

    Multi-level Affiliate Program

    Become a Lectron Associate and get true profit sharing. It's FREE to sign up!

  • Locations
  • Pricing
  • Merchandise
  • Documentation
  • Blog
Dashboard

Getting Started

  • How to Configure SRV Record Correctly
  • What is Lectron?
  • Getting started
  • Why is this called Armor?
  • How to use the Dashboard
  • Locations
  • Features
  • FAQ
  • Billings
  • how to report high ping to lectron?

Troubleshooting

  • What is Wireshark
  • Diagnosing Network Issues with MTR
  • Understanding IPv4 and IPv6
  • What are SSL, TLS, HTTP and HTTPS?
  • Ping and TraceRoute (tracert) commands
  • High Latency and General Lag
  • Edge TLS
  • Understanding FTP (File Transfer Protocol)
  • Understanding Network Address Translation (NAT)

Beginner's Guide

  • Proxy Protocol
  • What is UDP Protocol ?
  • What is TCP Protocol?
  • How to Configure SRV Record Correctly
  • What is the internet?
  • What is a Firewall?
  • TCP vs. UDP Comparison
  • Protected: What is a port?
  • What is a DDoS attack?
  • What is a server?
  • What is a proxy server?
  • How a DNS Server (Domain Name System) works

Start Crafting

  • Minecraft
  • Basic Commands
  • Craft Rules
  • How to play Minecraft – The Basic
  • How to Start
  • Understanding Hyperthreading in a Minecraft server

Brand

  • Mission
  • Personality
  • Promise
  • Values

Foundations

  • Accessibility
  • Color
  • Grid
  • Iconography
  • Illustrations
  • Logos
  • Typography
  • Images & Videos

Content

  • Inclusive language
  • Language and grammar
  • Messaging guidelines
  • Vocabulary
  • Voice and tone principles
  • Writing style

Components

  • Avatar
  • Avatar group
  • Badge
  • Banner
  • Breadcrumbs
  • Button
  • Checkbox
  • Code
  • Dropdown menu
  • Flag
  • Inline dialog
  • Inline message
  • Logo
  • Lozenge
  • Modal dialog
  • Pagination
  • Progress indicator
  • Progress tracker
  • Radio
  • Section message
  • Select
  • Spinner
  • Tabs
  • Tag
  • Text field
  • Toggle
  • Tooltip

Patterns

  • Benefits modal
  • First impressions
  • Forms
  • Inline edit
  • Messages
  • Page header
  • Spotlight

Resources

  • Color palettes
  • Design principles
  • Figma library
  • Fonts
  • Illustration library
  • Logo library
  • Protected: Presentation kit
  • Sketch library
  • Templates

Attack Types

  • Common Security Threats
  • DDoS through DNS Requests
  • Denial of Service explained
  • SYN Flood
  • TCP Half-Open
  • UDP Flood
  • DNS Reflection Attack
  • Ping of Death ICMP Attack
  • Slowloris Attack
  • Vulnerability Attack
  • Phishing Attacks

To Vietnam

  • OVH Singapore to FPT Vietnam
  • Vultr Singapore to FPT Vietnam
  • Hivelocity Hong Kong to Vietnam

Traceroute To India

  • FPT Hanoi to Tata India
  • Hivelocity New York City to Tata India
  • FPT Hanoi to Digital Ocean India

To Hong Kong

  • VNPT Ho Chi Minh City to Lectron Hong Kong
  • VNPT Hanoi to Leaseweb Hong Kong
  • Viettel Ho Chi Minh City to Lectron Hong Kong
  • Viettel Hanoi to Leaseweb Hong Kong
  • FPT Hanoi to Leaseweb Hong Kong

To Singapore

  • FPT Hanoi to Vultr Singapore
  • Hivelocity New York City to Vultr Singapore

To Lectron

  • Leaseweb Hong Kong to Lectron

FiveM Protection Setup

  • How to add Lectron proxy in server.cfg?
  • How to config FiveM Proxy in Lectron Dashboard?
  • How to Configure SRV Record Correctly
  • How to setup a free FiveM SRV record with Lectron (Domain / Subdomain)
  • Whitelist Lectron IP addresses to your FiveM server firewall
  • Use Lectron Dashboard to remote proxy your FiveM server
  • Protecting a Windows Server using a GRE Tunnel
  • Setup GRE Tunnel on Ubuntu 20 Linux Server

DDoS Attack

  • what is DDoS attack?
  • Overview of DDoS attack.
  • Characteristics of DDoS attack
  • Protective Measures

Tunnel Setup

  • Tunnel Setup for Windows Server with 1 public IP (beta)
  • Tunnel Setup for Ubuntu 20.04 or higher
  • Tunnel Setup on Ubuntu with interfaces file

SRV Load Balancing

  • How to Configure SRV Record Correctly
  • How to setup a free FiveM SRV record with Lectron (Domain / Subdomain)

Setup DNS for Minecraft Proxy

  • How to Configure SRV Record Correctly

Firewall

  • what is Firewall?

About Load Balancer

  • What is Load Balancer?
  • Load Balancer algorithm
  • Load Balancer components

About FiveM

  • Console commands
  • Installation
  • What is FiveM?

Teamspeak 3 Protection Setup

  • HOW TO PROTECT YOUR TEAMSPEAK 3?

SA-MP

  • How to connect your samp ip to domain?

Minecraft Proxy Setup

  • How to setup Bungeecord Minecraft Proxy?
  • How to setup Spigot Minecraft in Lectron Dashboard?

Proxy Server

  • What is proxy Server?
  • Types of Proxy Server

FiveM DNS config

  • Cloudflare DNS config for FiveM
  • Godaddy DNS config for FiveM
  • Google Domain DNS config for FiveM
  • Porkbun DNS config for FiveM

Minecraft DNS config

  • Cloudflare DNS config for Minecraft
  • Godaddy DNS config for Minecraft
  • Google domains DNS config for Minecraft
  • Porkbun DNS config for Minecraft

Basics of HTTP

  • What is HTTP?
  • What is the purpose of HTTP?
  • How does HTTP work?

Basics of HTTPS

  • What is HTTPS?
  • What is the purpose of HTTPS?
  • How does HTTPS work?
  • Home
  • Docs
  • Proxy Server
  • What is proxy Server?

What is proxy Server?

A proxy server is a machine that acts as an intermediary for requests, acting just like a mirror of the original. They can also be used to improve performance by making sure content is being fetched from one place, instead of many different servers. Proxies are often used to help protect one’s privacy, as they can hide the user’s IP address and stop potential hackers from seeing what the computer is doing.

A representative is an intermediate, who relays messages between you and servers. When you send queries through a proxy, the proxy sends them to Google instead of to you directly. For a discreet inquiry, you could have your spokesperson talk to Google and ask them how they’re cheating at poker. You can request a specific answer from them without revealing your identity to Google beforehand.

Processes are widely used for privacy, content filtering, temporary storage, and security login testing. They’re perfect for cases where you need to do a quick test of your system without putting in all the time & energy that you would into doing it normally.

We will create a new type of representative, known as the “man-in-the-middle” (MITM). Security login-proof inspectors often use MITM protocols to read, log on to, and modify client data that is exchanging with a remote server.

You can use MITM to check the traffic on your favorite dating app by ordering your smartphone to send traffic to your MITM representative. We can now answer the question of how far is Alex for you on your behalf. Your smartphone will no longer have to send this information through the server of that dating app, but instead send it through our MITM representative.

Your MITM representative will make this request and return it to your smartphone for any response received. It will also record the content of Your MITM representative will make this request and return it to your smartphone. You can then check that data for any replies you’ve received, in addition to the content of the original request. A representative will record all of their work so that you don’t have to. You can use the records they make to improve your phone apps when they come out or even modify them yourself.

How do you feel about this documentation?
Share This Article :
  • Facebook
  • Twitter
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on December 30, 2021
Types of Proxy Server

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Metaverse Anti DDoS

Get ready to launch your metaverse to the cosmic guard with Lectron!

Start now →
Discord
Follow Lectron
Facebook Twitter Instagram Linkedin Youtube
Follow Viet York, founder of Lectron
Facebook Twitter Instagram Linkedin Medium Github Twitch
Features
  • Data Center Locations
  • Anycast Proxy
  • DDoS Protection
  • Load Balancing
  • Game Protection
  • Game Acceleration
  • Vietnam
  • Free SSL/TLS
Comparisons
  • Full Comparison Chart
Developers
  • Documentation
Community
  • Facebook
  • Twitter
  • Instagram
  • Discord
  • Facebook Group
Articles
  • Proxy DDoS Protection
Company
  • About Us
  • Careers
  • Our People
  • Success Stories
  • Enterprise
  • Contact Us
Legal
  • Terms
  • Privacy
  • DMCA
Trustpilot
Copyright © 2019-2021 Lectron, Inc. All Rights Reserved