Quick sale! High Traffic Adult Humor Website 9gag2.com

Here for sale is a popular adult humor website- 9GAG2.COM

It has an established audience built up over 4 years and receives approx. 12,000 daily unique visitors with monthly revenue average of approx. 500 USD (I can provide Exoclick data starting from 2018-01-01).

Please contact me for more info on the website, access to google analytics, advertising info, info on digital transfer, etc.

Why…

Quick sale! High Traffic Adult Humor Website 9gag2.com

High Traffic Adult Humor Website 9gag2.com

Here for sale is a popular adult humor website- 9GAG2.COM

It has an established audience built up over 4 years and receives approx. 12,000 daily unique visitors with monthly revenue average of approx. 500 USD (I can provide Exoclick data starting from 2018-01-01).

Please contact me for more info on the website, access to google analytics, advertising info, info on digital transfer, etc.

Why…

High Traffic Adult Humor Website 9gag2.com

USB thetering kali traffic

I need some clarification for the following scenario

I have a lattepanda connected to an android through spacedesk but the internet (both data plan and wifi is turned off) on the android and only laatepand wifi is on

1 – If connected to a given wifi network can the provider of that network and the ISP connect back to the android IP/MAC?

2 – There is any kind of traffic being originated from/to the android?

Thanks

How do VPN providers exactly encrypt traffic from client to their server?

I’m thinking to build a VPN for personal use on a VPS but am unable to understand one thing. How exactly VPN providers encrypt data from client to their server? Suppose if I simply configure IP of my VPS and port in my browser it would be simple proxy it won’t encrypt traffic that originates from my machine or browser.

If I use OpenVPN would it solve the purpose?

One more thing which I can’t understand is, how do VPN providers exactly restricts usage to a few devices. Do they save device information? If by few devices they mean only X devices can run this VPN in parallel then how do the exactly restrict usage to only X devices because they have limited IPs and tons of users routing their traffic through them and there’s no way to know to know who is using how many devices. If this is mapped to user account and they figure this out via his unique account then technically they are maintaining logs right?

Traffic lights: why yellow before green?

Traffic lights around the world use the yellow light to warn people that it will soon turn to red, so that people can stop before. This is perfectly understandable.

However, I found out that in some European countries the yellow light is also shown when going from red to green.

Can somebody tell me what’s the purpose of this? From my judgement, it is completely unnecessary. It’s not like it is warning drivers of any danger. Do drivers need a sign that tells them to “prepare to go, but don’t go yet”? And why would they need it?

Popular Adult Humor Website 9gag2.com with high traffic!

Here for sale is a popular adult humor website- 9GAG2.COM

It has an established audience built up over 4 years and receives approx. 12,000 daily unique visitors with monthly revenue average of approx. 500 USD (I can provide Exoclick data starting from 2018-01-01).

Please contact me for more info on the website, access to google analytics, advertising info, info on digital transfer, etc.

Why…

Popular Adult Humor Website 9gag2.com with high traffic!

Access to unencrypted WAN traffic

A basic plain-text unencrypted TCP connection is setup as follows:

Network Client LAN <—-> Network Modem <–> ISP <–> Remote Server

The network Modem only has a single wired user, and nobody can sniff any LAN packets.

TCP packets are generated on the Network Client underneath the lan. The network modem sends packets to the ISP and then to a remote server.

Assume

  1. The Local and Remote server is completely trusted. No LAN traffic can be sniffed on either end.

  2. The ISP itself is trusted or are allowed to see the traffic, and they are not compromised.

Is there any way for hackers to see the unencrypted packets as they travel throughout the WAN? They know both the source IP and destination IP address. Can they sniff this traffic?

End to End Encrypted Traffic – Web Application Firewall needed?

Background

We have a Java Spring Server, MongoDB and an Angular Frontend.

Some Application Security Configs:

  • TLS
  • Basic Authentication (Password Strength Policy)
  • XSS Protection (Content Security Policy)
  • CSRF Protection (Double Submit Cookie)

All important user data which they generate through chats, creating topics, etc… is end to end encrypted (E2EE).

Now our hosting company can add a WAF (Web Application Firewall) to the Server Setup.

From the hoster’s advertisement:

OWASP Top 10 Protection:

  • Bot-Access Control
  • Remote File Inclusion
  • Illegal Resource Access- SQL Injection
  • Blocking policy (block request, block IP, block session)

Question

Do we need WAF if most of our data is E2EE? What would be the benefit of it in our setup?