• Boise State ditches Cisco DNS

    Posted October 7, 2009 - 3:55 pm

    Boise State University, the largest university in Idaho, has replaced its aging Cisco Network Registrar software with appliances from BlueCat Networks that it says are easier to manage and less expensive to operate for Domain Name System and Dynamic Host Configuration Protocol services.
  • Take two: Nominum tries hosted DNS

    Posted September 24, 2009 - 10:44 pm

    Nominum is hoping that the second time is the charm in the outsourced DNS market, as the maker of high-end DNS software announces a hosted service.
  • Serial numbers in zone files: Yours and named's

    Posted July 27, 2009 - 5:55 pm

    Serial numbers in zone files help your DNS service determine when it should re-ingest your zone files or ignore them. But there's more to these pseudo timestamps than meets the eye. In fact, the number that you put in your file and the one that DNS extracts from it might be as different as 200907270001 and 3338774385.
  • NeuStar offers temporary fix for Kaminsky bug

    Posted June 16, 2009 - 2:12 pm

    NeuStar has developed a proprietary system for thwarting Web traffic hijacking attacks that the company plans to market until standard DNS Security (DNSSEC) mechanisms are deployed widely across the Internet.
  • New DNS bug and fix announced

    Posted May 19, 2009 - 8:44 pm

    Domain name registries are scrambling to patch a newly discovered bug in popular open source DNS software that could be exploited for denial-of-service attacks.
  • UltraDNS service knocked offline by attack

    Posted April 1, 2009 - 10:34 am

    NeuStar confirmed that its UltraDNS managed DNS service was knocked offline for several hours Tuesday morning by a distributed denial of service attack.
  • Use OpenDNS To Protect Your Business Network

    Posted March 27, 2009 - 9:41 am

    If you aren't using OpenDNS to protect your small business network, now is the time to take the few minutes to set it up.
  • Techies end-run feds on DNS security

    Posted February 23, 2009 - 3:29 pm

    Forty years ago, when the U.S. government created the packet switching network that became the Internet, one of its goals was to create a robust network where traffic would be dynamically routed around blockages. Now the Internet engineering community has developed a strategy to route around a different kind of blockage -- one that is political, rather than technical -- and one that has been caused by the U.S. government itself.
  • Security researcher Kaminsky pushes DNS patching

    Posted February 19, 2009 - 5:30 pm

    Dan Kaminsky, who for years was ambivalent about securing DNS, has become an ardent supporter of DNS Security Extensions.
  • Securing DNS should trump budget-cutting, experts say

    Posted December 31, 2008 - 11:29 am

    The discovery of a major DNS flaw in mid-2008 landed the technology in many headlines, but with econ

  • How DNS cache poisoning works

    Posted October 20, 2008 - 1:40 pm

    There has been a long history of attacks on the Domain Name System ranging from brute-force denial-of-service attacks to targeted attacks requiring specialized software. In July 2008 a new DNS cache-poisoning attack was unveiled that is considered especially dangerous because it does not require substantial bandwidth or processor resources nor does it require sophisticated techniques. Here's how DNS cache poisoning works, and what can be done to prevent attacks.
  • U.S. gov't proposes digital signing of DNS root zone file

    Posted October 10, 2008 - 11:11 am

    The U.S. government is soliciting input on a way to make the Internet's addressing system less susceptible to tampering by hackers.
  • At the front lines of protecting the Internet

    Posted September 2, 2008 - 3:59 pm

    VeriSign is in many ways synonymous with managing the Web, thanks to its handling of key DNS root servers and of name resolution for .com, .net, and other domains. In recent years, it's had both strong ups and strong downs. In this interview, VeriSign CTO Ken Silva discusses the company's current and past challenges.
Join us:






Join today!

See more content
Ask a Question