DNS whitelist firewall on a router. Deny everything that is not whitelisted by address and port.
- JumpNSFW
Annuit Coeptis
Linux @lemmy.world Are there any ways to block unicode private use areas from coding at the kernel level?
No Stupid Questions @lemmy.world What is hubris as an adjective?
Ask Science @lemmy.world What is the limiting constraint on space based kinetic weapons in the present and future?
Linux @lemmy.world Swap web addresses in source: any tricks to share?
Linux @lemmy.world How to confine an existing distrobox container?
AI Generated Images @sh.itjust.works ComfyUI
Ask Lemmy @lemmy.world What are the best things to say to someone with body type insecurity?
Linux @lemmy.world (bash?) matching Array of Arrays against a simple k:v json at ~200k lines?
3DPrinting @lemmy.world Designed road bike hand controls hoods backing, printed in TPE
3DPrinting @lemmy.world Almost there
3DPrinting @lemmy.world Little reverse engineering project - road bike indexed shifting designed to print
Word of the Day @lemmy.world tendentious
pics @lemmy.world Crew 11
Ask Lemmy @lemmy.world LockedDo you know of any tools for translating words into one of several languages in real time like a code completion drop down?
Ask Lemmy @lemmy.world What are the rules of popular content creators/creations?
Ask Lemmy @lemmy.world What is your meta thought process like when drawing your own handwriting?
Retro Computers @lemmy.world 6502/65816/Z80 on the same bus
Ask Science @lemmy.world Do two orbiting black holes have a gravitational resonant effect?
3DPrinting @lemmy.world If fiber infused material is abrasive to soft metals, it may be useful as a sanding medium
Lemmy Shitpost @lemmy.world to the whitehouse! 🍾
With a DNS whitelist, all incoming packets are dropped unless the address is on the list. It is like ad block, but reversed. You are not blocking known ad servers, but all servers except those you actually want to connect to. It is a pain in the ass to look at logs and white list all the time. In reality, you only visit around a hundred sites or less that you actually need or want to connect to. Nothing gets in except what you want. That kills most vulnerabilities.