Join us

ContentUpdates and recent posts about Tor..
Story
@laura_garcia shared a post, 2ย weeks, 5ย days ago
Software Developer, RELIANOID

Strengthen Your MFA with Google Authenticator and RELIANOID

๐Ÿ” Strengthen Your MFA with Google Authenticator and RELIANOID At RELIANOID, we take authentication seriously. We've just published a new technical guide on how to integrate Google Authenticator into the RELIANOID MFA Portal, using Active Directory or LDAP to manage user secrets. โœ… Understand TOTP vs..

2FA with AD_LDAP and Google Authenticator
Story Trending
@habiledata shared a post, 3ย weeks, 1ย day ago
HabileData

5 Product Data Quality Issues in Multi-Channel Retail and How to Address Them

Weaknesses in product data expose themselves quickly in a multi-channel retail environment. Define a master schema, maintain control of your inventory and pricing via rules, continuously monitor for compliance, and connect performance metrics to the precise changes made for each SKU.

fixing-product-data-at-scale-5-issues-that-hurt-retail-listings
Story
@laura_garcia shared a post, 3ย weeks, 2ย days ago
Software Developer, RELIANOID

RELIANOID NIS360 Alignment & Compliance

๐Ÿ” RELIANOID NIS360 Alignment & Compliance At RELIANOID, we align our security strategy with the ENISA NIS360 Cyber Risk frameworkโ€”helping organizations in critical sectors strengthen resilience and improve cybersecurity maturity. From governance and risk management to incident readiness and supply..

enisa nis360 relianoid
Story HitechDigital Solutions Team
@hitechdigital shared a post, 3ย weeks, 2ย days ago
Business Consulting, HitechDigital Solutions

How SolidWorks Sheet Metal CAD Drafting Delivers Shop-Ready Drawings

Fabricating sheet metal requires documentation that describes the designerโ€™s intent of how to manufacture the part. By linking parametric 3D models directly to manufacturing documentation viasheet metal CAD draftingin SolidWorks, each dimension, bend note, and flat pattern is the same as what has be..

How SolidWorks Sheet Metal CAD Drafting Delivers Shop-Ready Drawings
Story Palark Team Trending
@shurup shared a post, 3ย weeks, 3ย days ago
@palark

Kubernetes 1.36 new alpha features

Kubernetes

Kubernetes v1.36 will be released in 2 weeks. What will change? Here are prominent newly introduced alpha features in the v1.36 release: - Workload-aware preemption. Groups of related Pods are now treated as a single entity. - Topology-aware workload scheduling, allowing you to place a group of Pods..

kubernetes-v1.36-release
Story
@laura_garcia shared a post, 3ย weeks, 3ย days ago
Software Developer, RELIANOID

๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€ ๐Ÿญ๐Ÿฌ๐Ÿญ: ๐—ช๐—ต๐˜† ๐—•๐—ผ๐˜๐—ป๐—ฒ๐˜๐˜€ ๐—”๐—ฟ๐—ฒ ๐—ฎ ๐— ๐—ฎ๐—ท๐—ผ๐—ฟ ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜

๐Ÿ” ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€ ๐Ÿญ๐Ÿฌ๐Ÿญ: ๐—ช๐—ต๐˜† ๐—•๐—ผ๐˜๐—ป๐—ฒ๐˜๐˜€ ๐—”๐—ฟ๐—ฒ ๐—ฎ ๐— ๐—ฎ๐—ท๐—ผ๐—ฟ ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ Cyberattacks are evolving fast. Among the most common: MITM DDoS IP & DNS Spoofing Rootkits Botnets โš ๏ธ ๐—•๐—ผ๐˜๐—ป๐—ฒ๐˜๐˜€ ๐˜€๐˜๐—ฎ๐—ป๐—ฑ ๐—ผ๐˜‚๐˜โ€”networks of infected devices used for DDoS, data theft, and large-scale attacks. ๐Ÿ›ก๏ธ ๐—›๐—ผ๐˜„ ๐—ฅ๐—˜๐—Ÿ๐—œ๐—”๐—ก๐—ข๐—œ๐—— ๐—ฃ๐—ฟ๐—ผ๐˜๐—ฒ๐—ฐ๐˜๐˜€ ๐—ฌ๐—ผ๐˜‚ Traffic filter..

Story
@vaibhavgupta shared a post, 3ย weeks, 3ย days ago

Awesome Shadcn Tooltip Components

Next.js React tailwindcss TypeScript

The blog introduces 7 reusable tooltip components built with shadcn/ui for React apps - focused on accessibility, customization, and real-world UI use cases.

Shadcn Tooltip Components
Story WrapPixel Team
@sanjayjoshi shared a post, 3ย weeks, 3ย days ago

Build Login Faster with These Free Shadcn Login Blocks & Components

Looking for a clean login UI for your web project?
Here are some practical Shadcn login components & blocks built for React and Next.js simple, fast, and easy to integrate.

Login Thumbnail
Story Keploy Team
@sancharini shared a post, 3ย weeks, 3ย days ago

Black Box vs White Box Testing in Unit, Integration & E2E Testing: Where Each Belongs

Understand where black box and white box testing belong across unit, integration, and E2E testing. Learn the right technique for every layer of your test suite.

black box vs white box testing image
Story
@laura_garcia shared a post, 3ย weeks, 4ย days ago
Software Developer, RELIANOID

Deploy RELIANOID Load Balancer Community Edition v7 on AWS in minutes with Terraform.

โšก Deploy RELIANOID Load Balancer Community Edition v7 on AWS in minutes with Terraform. From zero to a fully functional load balancer โ€” automated, reproducible, and ready to go. ๐Ÿ‘‰ Follow the step-by-step guide and get started fast. #Terraform#AWS#InfrastructureAsCode#DevOps#RELIANOID#Automation http..

terraform_relianoid_community_img2 (1)
Tor (The Onion Router) is an open-source network and software suite designed to protect user privacy and enable anonymous communication on the internet. It works by routing network traffic through a distributed, volunteer-run network of relays, encrypting data in multiple layers so that no single relay knows both the source and destination of the traffic. Tor is widely used to defend against traffic analysis, surveillance, and censorship. By obscuring IP addresses and routing paths, it helps users browse the web anonymously, publish information safely, and access services without revealing their location or identity. The network supports standard web traffic as well as specialized .onion services, which allow websites and services to operate anonymously without exposing their physical hosting location. Beyond web browsing, Tor is used as a foundational privacy layer for secure messaging, whistleblowing platforms, journalism, activism, academic research, and secure system administration. It is also integrated into many privacy-focused operating systems and tools. While Tor can reduce traceability, it does not make users invulnerable and must be used with proper operational security to avoid deanonymization risks. Tor is developed and maintained by the Tor Project, a nonprofit organization dedicated to advancing digital privacy and freedom worldwide