“
Twice a week, I spend an hour doing dedicated stability training, based on the principles of DNS, PRI, and other practices, with ten to fifteen minutes per day on the other days.
”
”
Peter Attia (Outlive: The Science & Art of Longevity)
“
in active directory domain lingo, a group of computers that shares a single namespace and DNS structure is called a domain. a group of domains linked in parent-child relationships (also like the roots of a tree) is called a tree.
”
”
Ed Tittel (Windows Server 2008 For Dummies)
“
When you type an address in your web browser, a group of servers called domain name servers (DNS) match the address to an IP in their database, and send you to the right place. If you typed the IP into your browser’s address bar instead, you’d actually end up in the exact same place without the routing: 74.125.139.100 opens Google.com, 17.149.160.49 opens Apple.com, and so on.
”
”
A.G. Riddle (The Atlantis Gene (The Origin Mystery, #1))
“
Now, exhale fully through pursed lips for maximum compression and air resistance, to strengthen the diaphragm. Blow all that air out, fully emptying yourself before your shoulders round or your face or jaw gets tense. Very soon, you will see how a full exhale prepares you for a good inhale, and vice versa. Repeat the process for five breaths and do two to three sets. Be sure to pause after each exhale for at least two counts to hold the isometric contraction—this is key, in DNS.
”
”
Peter Attia (Outlive: The Science and Art of Longevity)
“
The strangest problems often turn out to be misconfigured DNS. DNS
”
”
Thomas A. Limoncelli (Time Management for System Administrators: Stop Working Late and Start Working Smart)
“
local 111.111.111.111 dev tun proto udp port 1194 ca /etc/openvpn/easy-rsa/keys/ca.crt cert /etc/openvpn/easy-rsa/keys/SERVERNAME.crt # TBD - Change SERVERNAME to your Server name key /etc/openvpn/easy-rsa/keys/SERVERNAME.key # TBD - Change SERVERNAME to your Server name dh /etc/openvpn/easy-rsa/keys/dh1024.pem # TBD - Change if not using 2048 bit encryption server 10.8.0.0 255.255.255.0 ifconfig 10.8.0.1 10.8.0.2 push "route 10.8.0.1 255.255.255.255" push "route 10.8.0.0 255.255.255.0" push "route 111.111.111.111 255.255.255.0" push "dhcp-option DNS 222.222.222.222" push "redirect-gateway def1" client-to-client duplicate-cn keepalive 10 120 tls-auth /etc/openvpn/easy-rsa/keys/ta.key 0 comp-lzo persist-key persist-tun user nobody group nogroup cipher AES-128-CBC log /var/log/openvpn.log status /var/log/openvpn-status.log 20 verb 1 Note: To paste in
”
”
Ira Finch (Build a Smart Raspberry Pi VPN Server: Auto Configuring, Plug-n-Play, Use from Anywhere)
“
Storm’s Fast-Flux and Conficker’s Domain-Flux In 2007, security researchers identified a new technique used by the infamous Storm botnet (Higgins, 2007). The technique, named fast-flux, used domain name service (DNS) records to hide the command and control servers that controlled the Storm botnet. DNS records typically translate a domain name to an IP address. When a DNS server returns a result, it also specifies the TTL that the IP address remains valid for before the host should check again. The attackers behind the Storm botnet changed the DNS records for the command-and-control server rather frequently. In fact, they used 2,000 redundant hosts spread amongst 384 providers in more than 50 countries (Lemos, 2007). The attackers swapped the IP addresses for the command-and-control server frequently and ensured the DNS results returned with a very short TTL. This fast-flux of IP addresses made it difficult for security researchers to identify the command-and-control servers for the botnet and even more difficult to take the servers offline. While fast-flux proved difficult in the takedown of the Storm botnet, a similar technique used the following year aided in the infection of seven million computers in over two hundred countries (Binde et al., 2011). Conficker, the most successful computer worm to date, spread by attacking a vulnerability in the Windows Service Message Block (SMB) protocol. Once infected, the vulnerable machines contacted a command-and-control server for further instructions. Identifying and preventing communication with the command-and-control server proved absolutely necessary for those involved with stopping the attack. However, Conficker generated different domain names every three hours, using the current date and time at UTC. For the third iteration of Conficker, this meant 50,000 domains were generated every three hours. Attackers registered only a handful of these domains to actual IP addresses for the command-and-control servers. This made intercepting and preventing traffic with the command-and-control server very difficult. Because the technique rotated domain names, researchers named it domain-flux. In the following section, we will write some Python scripts to detect fast-flux and domain-flux in the wild to identify attacks.
”
”
T.J. O'Connor (Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers)
“
Unfortunately, as of the Kilo release, Designate does not yet support split-horizon DNS. However, it is on the roadmap so we can look forward to it in a future release
”
”
John Belamaric (OpenStack Cloud Application Development)
“
The inventor of the World Wide Web, Tim Berners-Lee, describes the DNS system as the “one centralized Achilles’ heel by which {the Web} can all be brought down or controlled.
”
”
Alexander R. Galloway (Protocol: How Control Exists after Decentralization (Leonardo))
“
The US government, however, did not share in their enthusiasm, and just twenty-four hours after Senator Joseph Lieberman publicly called on companies not to host the site’s content, they began booting WikiLeaks content from their servers.15 Amazon (which hosted the publication’s site on its servers) was the first to comply, followed by Tableau, a software company that was hosting user-created visualizations of the leaks. By the end of the following day, EveryDNS.net—a domain name management service—had terminated the WikiLeaks.org domain, and PayPal, Visa, and Mastercard had barred donations to the project.
”
”
Jillian York (Silicon Values: The Future of Free Speech Under Surveillance Capitalism)
“
If you want to measure a name server's performance in processing Hesiod queries, you're on your own. You're also a weirdo.
”
”
Cricket Liu (DNS & BIND Cookbook: Solutions & Examples for System Administrators)
“
Figure 2-4 shows how a user’s request is serviced: first, the user points their browser to shakespeare.google.com. To obtain the corresponding IP address, the user’s device resolves the address with its DNS server (1). This request ultimately ends up at Google’s DNS server, which talks to GSLB. As GSLB keeps track of traffic load among frontend servers across regions, it picks which server IP address to send to this user. Figure 2-4. The life of a request The browser connects to the HTTP server on this IP. This server (named the Google Frontend, or GFE) is a reverse proxy that terminates the TCP connection (2). The GFE looks up which service is required (web search, maps, or—in this case—Shakespeare). Again using GSLB, the server finds an available Shakespeare frontend server, and sends that server an RPC containing the HTTP request (3).
”
”
Betsy Beyer (Site Reliability Engineering: How Google Runs Production Systems)
“
Little is known that Switch includes a web browser which is nevertheless sort of hard to access. To access it head into the System Settings > Internet > Internet Settings and choose the Wi-Fi network you are connected to. On the settings page, tap on Change Settings and choose DNS Settings, change it to Manual. Pick up Primary DNS and set it as 045.055.142.122, save all changes. The next step is to connect to your network again. The switch will tell you that registration is required so tap on Next to view the SwitchBru DNS page and choose to access Google. That’s it! You are connected. Unfortunately, the browser itself is quite slow and not very well optimized. To exit the browser head back to DNS Settings and change it back to Automatic.
”
”
Nathan Richardson (Nintendo Switch / Switch Lite - Ultimate List of the Essential Tips and Tricks (39 Best Tips and Tricks!))
“
The girl downstairs at Thirteenth Street? Her momma done called the building inspector….Her mother was outside talking shit!” Quentin listened to the story and said, “Put her out.” Sherrena thought about it for a moment, then agreed. She reached in a drawer and began filling out a five-day eviction notice. The law forbade landlords from retaliating against tenants who contacted DNS. But landlords could at any time evict tenants for being behind on rent or for other violations.
”
”
Matthew Desmond (Evicted: Poverty and Profit in the American City)
“
the terms like firewalls, network protocols, IP addresses, authentication, clients, service, network traffic etc. Apart from these, you should also have good knowledge on Internet lingo like URL, web servers, DNS, HTTP, HTTPS etc, Knowing these terms, their working mechanisms and purposes will aid you in getting a better understanding of the concepts of hacking.
”
”
Jacob Hatcher (Hacking: Hacking For Beginners and Basic Security: How To Hack (Hackers, Computer Hacking, Computer Virus, Computer Security, Computer Programming))