Set up DDNS in Synology DSM


Today’s article is about how to update DNS entries for domains from via the Synology DSM function DDNS (Dynamic DNS). Since is neither available as a provider in Synology DSM, nor do the formerly common intermediary services work, this is only possible with a small workaround. And this is exactly what I would like to show you today.

You need the following things for today’s tutorial:

A domain at Namecheap.comA Synology NAS (or a custom NAS with XPEnology)A webserver with PHP support

In the next paragraph we will outline the actual problem again in detail. If you are only interested in the solution, you can skip the following paragraph…

What is the problem with Synology DSN and Namecheap?

Namecheap provides a url/web service that you can call to set a DNS […]

Crash course VPN: PrivadoVPN in test

Over the last few years, the topic of VPNs has become more and more important. At least that is my personal feeling. Whether for daily surfing or as a sponsor for almost every second YouTuber – VPN providers are now continuously running across our path. Reason enough to test one of these providers again.

Today’s article is about Privado. First of all, to pay tribute to the idea of transparency: I received the account used for the test from Privado free of charge for 30 days. I did not receive any further compensation. Before we start with the actual test, let’s take a quick look at the topic “VPN”. If you already know what a VPN is for and what advantages/disadvantages it has, you can skip the following paragraph.

Why VPN?

First, let’s look at a definition. Wikipedia says…

A virtual private network (VPN) extends a private network across a public network and enables users to send and […]

AJAX, jQuery & how to bypass the same-origin policy

AJAX und Cross-DomainToday’s post is intended to give a brief introduction to the topic of AJAX with jQuery, as well as to cover the topic of cross domain (policy) and to show how you can use small tricks to send AJAX requests across multiple domains. Before we start, however, we will give you a quick introduction to the topic. If you are already familiar with the topic and are only interested in the AJAX cross-domain workaround, you can safely skip the first part of the article.
What is AJAX and how does it work in jQuery?
AJAX is an abbreviation and stands for “Asynchronous JavaScript And XML”. Contrary to the opinion of some people on the Internet, it is not a programming language, but rather a pattern, i.e. a way of programming something. By means of AJAX web content can be retrieved via Javascript, […]

Steganography with PHP – Hide files in images

Steganographie mit PHPIn this article we want to deal with the topic of steganography and implement a small example in PHP. Because PHP is not “only” used to create web pages or to implement forms, as any experienced PHP programmer of larger web agencies will surely confirm.
Besides functions for text processing, PHP also provides methods for image processing as well as for manipulation on bit and byte level. And these are the ones we want to use today. But before we start coding, we will have a short introduction to the topic of steganography.
Steganography is not shorthand
As the title already announced, today’s topic is steganography, the art of hiding information or knowledge in a carrier medium. Wikipedia defines steganography as follows:
Steganography (/ˌstɛɡəˈnɒɡrəfi/) is the practice of concealing a message within another message or a physical object. In computing/electronic contexts, a computer file, […]

Basics: Secure password hashing with salts

Passwörter in Plaintext speichernAnyone who develops software and especially if he/she does so in the web environment, has certainly already written one or the other login system or at least had points of contact in this area. Besides the logic of a secure login or user management system, the secure storage of passwords is one of the most important points during implementation.
Even if the actual login code is 100 percent error-free and secure (which should never be assumed in practice), security vulnerabilities in the server software can still lead to intrusions or hacks. There is always a variable that is out of one’s control and thus websites are hacked, compromised and complete databases with usernames and passwords are read every day.
In order to protect users in the best possible way in the event of such a […]