As I already explained in Part 1, the current state of DNS is pretty insecure. The goal of DNSSEC is to improve this situation. Here is how that (should) work. I won’t go into cryptographic details here, but just show the general behaviour.
DNS is probably one of the most important protocols on the internet. Everybody uses it countless times each day, usually without even noticing it. Every time somebody visits any website, every time somebody sends a mail, every time somebody wants to do literallly ANYTHING on the internet, a DNS server is involved.
If you are anything like me , you like to have dedicated Services which do stuff for you. One of the Services I like in particular is pyLoad . This program you be used to automatically load files from OneClick Hosters. This is esspecially useful if you run this on a small computer like the Raspberry Pi  and dump the downloaded data to a central Storage like a NAS.
There are lots of blogposts out there which detail how to install pyLoad on a RaspberryPi [4, 5, 6]. For most parts I don’t really want to say anything against these, but there was one point in particular that I dislike about all of these. This is the reason why I am now writing my own guide. So let’s get started.
After quite a long time of silence (*cough* Sorry about that) I think I can write a new post.
At the end of last year I was at the 32C3. That is the 32nd Chaos Communication Congress. This year about 12000 nice people got together and captured the Congress Center in Hamburg for four days. Apart from the giant program of talks (which I will talk about in a second) the main part of the congress is the opportunity to meet other people and have a blast of a time. I managed to meet a lot of nice people and I learned so much during the time that I will need some time to fully sort that in my mind.
It looks like the DHL managed to pull my notebook back out of the lava pit it fell into. I received a mail from Lenovo that my notebook was returned to them, due to a wrong address. I phoned them and they sent it again.