Updated FAQ (markdown)

Gerd 2024-12-17 16:50:19 +01:00
parent 3eb95720ae
commit 8e8d5c3b61

4
FAQ.md

@ -27,10 +27,6 @@ https://github.com/hagezi/dns-blocklists/blob/main/statistics.md
> [!IMPORTANT]
Another important recommendation is to combine one main list with the [Threat Intelligence Feeds](https://github.com/hagezi/dns-blocklists#tif) list if possible. For Adblockers that have problems with the size of the full TIF list there is a smaller [medium](https://github.com/hagezi/dns-blocklists#tifmedium) and [mini](https://github.com/hagezi/dns-blocklists#tifmini) version. If you use AdGuard Home or AdGuard DNS, I also recommend using the [Dandelion Sprout's Anti-Malware List](https://raw.githubusercontent.com/DandelionSprout/adfilt/master/Alternate%20versions%20Anti-Malware%20List/AntiMalwareAdGuardHome.txt). There is also an [IPv4 list](https://github.com/hagezi/dns-blocklists#tifips) that can be used additionally to the TIF or TIF medium/mini list.
> [!TIP]
> **Only for NextDNS users:** The [Threat Intelligence Feeds](https://github.com/hagezi/dns-blocklists#tif) list is not available in NextDNS, the security features should be used instead. Furthermore, I recommend that NextDNS users also use the [OISD](https://oisd.nl/) list, which also contains a handful TIF sources that are not covered by the NextDNS security features.
> **This combination does not cover the entire bandwidth of the TIF, but it compensates a little.**
**Further additional options to the main lists depending on the use case are:**
- **Security:** In addition to the [Threat Intelligence Feeds](https://github.com/hagezi/dns-blocklists#tif) list, use the [Dynamic DNS](https://github.com/hagezi/dns-blocklists#dyndns), [Badware Hoster](https://github.com/hagezi/dns-blocklists#hoster), [Most Abused TLDs](https://github.com/hagezi/dns-blocklists#tlds) and [Newly Registered Domains (NRDs)](https://github.com/hagezi/dns-blocklists#nrd) list to further protect yourself from malicious things.