Quantcast
Channel: Engineering – NordVPN
Browsing all 12 articles
Browse latest View live

Binary memory protection measures on Windows OS

Binary memory protection is a core part of cybersecurity, but there are many different options for implementing it. In this article, we explore common mechanisms and protection measures for Windows...

View Article


Rendering Storyblok Rich Text in Astro

Rendering Rich Text elements in headless content management systems (CMS) like Storyblok can be challenging. We decided to carry out this process with Astro. Here is what we learned in the process....

View Article

How to sync data from MySQL to Google BigQuery using Debezium and Kafka Connect

Syncing data from a MySQL database to Google BigQuery can be a great way to keep your data up to date and easily accessible for analysis. In this article, we will explore the process of setting up...

View Article

WireGuard kernel module vs. user space: Speed and performance

   The WireGuard kernel module has been enabled in AOSP (Android Open Source Project) since 2020 and should in theory be preferred over user space implementations. The Nord Security team explored this...

View Article

A quick dive into identity- and attribute-based encryption

Securing data and communications with genuine encryption is not a simple process, as anyone who has ever dealt with{‘ ‘} S/MIME {‘ ‘} or{‘ ‘} PGP {‘ ‘} can attest. The biggest problem is the trusted...

View Article


Un gran motivo para entusiasmarse con NordLynx (TL;DR: es la velocidad)

NordLynx, nuestro flamante protocolo basado en WireGuard®, está encantando a los usuarios por su alta velocidad y sus excelentes seguridad y privacidad. Sin embargo, antes de publicarlo, necesitábamos...

View Article

Threat Protection: NordVPN’s solution against phishing

With so much online content at your fingertips, it’s easy to click on a random link or a bright ad without thinking twice. But that’s how you might end up on a phishing website and put your privacy at...

View Article

Shift left: Proactive security, embedded early in development

Sensitive information on your phone, computer, or smartwatch is at risk every time you use an application that isn’t properly secured. To ensure the safety of user data and a robust application,...

View Article


NordLynx 的厲害之處(如果太長不想看:就是網速)

NordLynx 是我們基於 WireGuard 的全新安全協定,給用戶帶來超快的網速和無懈可擊的安全及私隱。此外,我們在推出 NordLynx 前觀察了其實際表現,進行了配置調整和客戶端完善。我們準備把 NordLynx 發佈到 Windows、Mac、iOS 和 Android 等主要平台前,在 Linux 系統進行了測試。 我們相信 NordLynx 得益于 WireGuard®...

View Article


Libdrop: File sharing through NordVPN

The Libdrop library allows NordVPN users to share files over Meshnet. In this article, we explain how we developed our file transfer system and the role Libdrop plays in it. What is Libdrop? Libdrop...

View Article

Threat Protection Pro: Defending against cloaking techniques

Cloaking is a dangerous technique that scammers use to direct you to phishing websites. How can you know you’re being scammed if both the web page and its URL look legit? As the name suggests,...

View Article

How we implemented traffic routing in Meshnet for increased security

Traffic routing is a significant feature provided by NordVPN’s Meshnet. Essentially, it allows any Meshnet-connected device, called a node, to become a VPN server for other nodes. To do this, the end...

View Article
Browsing all 12 articles
Browse latest View live