This article describes the basic aspects of the functioning of the DNS.
A capacious post about the URL components that are needed to connect to a specific application on a remote machine somewhere on the Internet. The author talks about UUCP, DNS, TLD, Punycode, protocols and ports.
Our material on the topic of domain names. In it, we consider the basic aspects of the functioning of the DNS and the security issues of DNS servers.
With the development of the Internet infrastructure, a system was needed that would streamline the ever-growing information. This is how domains of different levels of hierarchy arose. About them and will be discussed in this article.
Translation of Daniel Stenberg's material on disagreements in understanding the concept of a URL (URI) and the peculiarities of identifying URL encodings in the world.
There is an important problem that even the largest global companies neglect - the lack of SPF records in most domains, which protects the domain from unauthorized use in e-mail. This illustrative material explains why this needs attention.
Web developer Alexander Zelenin in his post tells how to make your website open quickly. Very fast.
The necessary theoretical basis for DNS: what commands to use and how to behave in the event of typical problem situations.
A small but colorful comic about how DNS works.
Material on the positive impact of IPv6 on DNS (with statistics).
The causes of DDoS attacks, the principle of their actions, how to find out that it was a DDoS attack and who is behind it.
Detailed, but concise tutorial on some features of DNS with a list of additional useful materials, tools and links on DNS.
Why, after changing the DNS, you need to wait from days to 72 hours for the availability of the site by domain name?
DNS policies are needed to control how the DNS server processes requests based on various parameters. More in this material.
Here is a hierarchical structure of the DNS database and discusses the processes of interaction between clients and DNS servers.
This article covers the most common types of DDoS attacks, including a DNS attack with a boost.
A wide arsenal of methods and recommendations for ensuring domain security: from organizing a DMZ local network and checking SPF records to setting up audit systems and security scanners.
Consideration of the problem of interception and substitution of DNS queries on the example of Yandex and the use of technology DNSCrypt as a way to prevent possible attacks.
The study, which aims to find out how the top 100 banks in Russia ensure their security. Comparison with the most popular sites on the Internet.
If instead of facebook.com you see, for example, fasebook.com or something like that, you should not expect anything good from such a page. But what if the fake page is located at this address? It turns out that such an unpleasant option is also possible. Here is how it works.
The author's arguments about the imperfections and vulnerabilities of the DNS, decentralized Internet security and a bug called Dirty Cow.
Material about the opposition of DDoS-attack through reflection.
Matthew O'Riordan, co-founder of Ably, provides a list of recommendations for eliminating errors associated with DDoS attacks on the DNS server.
You may have heard that in October 2016 more than eight dozen major sites and services, including Twitter, Amazon, PayPal and Netflix, did not work due to a hacker attack. Read what happened, why it is so dangerous, and how this incident affects everyone.
News material about who was to blame for the violation of the world's largest sites.
The first part of a large article about the device DDoS-attack through reflection (DNS Amplification). The ultimate goal of the article is to show how you can effectively deal with spurious DNS traffic.
In this article, we describe how 1cloud implemented the DNS management function based on various products.
This article discusses the protocols of the channel, network and transport layers. Sit back and read to your health.
Why is my site not working? Usually, the questioner either does not know about the DNS, or does not understand the fundamental ideas. For many, DNS is a terrible and incomprehensible thing. This article is an attempt to dispel such fear.
Algorithm for joint configuration of DHCP and DNS with the study of various problems and ways to prevent them.
This article discusses the popular vulnerabilities of the BIND DNS server implementation, as well as utilities to eliminate and prevent possible errors.
Instructions for recognizing malicious DGA-domains by means of neural networks.
Advantages and disadvantages of using PowerDNS to block Internet advertising.
A series of articles from Vladimir Kozlovsky about organizing your own cloud hosting.
How to set up home DNS hosting in conjunction with DDNS subdomains for a free host of sites.
The material from Vena, which explains why problems with the DNS (server, caching, CNAME, etc.) is not only pain, but also a certain amount of fun.
This article will discuss why we have developed a new service - a free DNS hosting service.
List of services that provide reliable (secure) subdomains and / or other useful information about the subdomain and its features.
An impressive list of free resources for web developers (including those related to DNS, CDN, DDoS protection and web hosting).
The formation of DNS hosting Mail.ru: from the choice of server and name to debugging functionality.
Sarcastic material about the "failing technology" DNSSEC and its uselessness.
The study of possible difficulties and pitfalls when transferring a domain by the example of transferring the domain bits.media from the old Godaddy registrar to the new Internetbs.
Features of commercial operation of the IPv6 protocol in the form of dual stack.
The author conducted a small study of the variables in the Mikrotik scripts, examined the declaration and initialization under a magnifying glass. All this is his material.
At the end of the first episode of the second season of Mr Robot, there is a scene where Darlene generates a ransomware Trojan using the modified SET framework. There appears the IP address 192.251.68.254, where the Trojan's control server is located. How deep is the rabbit hole?
Source: https://habr.com/ru/post/319848/
All Articles