Tags: dns

3 Useful Things You Can Do with the IP Tool in Linux

It has been more than a decade since the ifconfig command has been deprecated on Linux in favor of the iproute2 project, which contains the magical tool ip. Many online tutorial resources still refer to old command-line tools like ifconfig, route, and netstat. The goal of this tutorial is to share...
Read 0 Comments

Achieve Resilient Cloud Applications Through Managed DNS

As the pace and complexity of application development and delivery have increased, the role of DNS has changed considerably. Originally, DNS was a simple on-premises location service for matching IP addresses to correct hostnames. As applications have moved from local data centers to the public...
Read 0 Comments

Suspicious Event Hijacks Amazon Traffic for 2 Hours, Steals Cryptocurrency

Amazon lost control of a small number of its cloud services IP addresses for two hours on Tuesday morning when hackers exploited a known Internet-protocol weakness that let them to redirect traffic to rogue destinations. By subverting Amazon's domain-resolution service, the attackers masqueraded as...
Read 0 Comments

Tips for Troubleshooting DNS

Need relief for your DNS headaches? First, it helps to understand how the domain name system works under the hood. DNS is the Internet's phonebook. Whenever you type in or click a human-readable web link (such as hpe.com), your web browser calls on a domain name system (DNS) resolver to resolve...
Read 0 Comments

DNS Resolvers Performance Compared: CloudFlare x Google x Quad9 x OpenDNS

A couple of months ago I did a performance comparison between some of the top free DNS Resolvers available. It was just after Quad9 had launched and I was trying to decide which one to use and recommend to families and friends. Google, OpenDNS, Quad9, .. some many options… I love options … And...
Read 0 Comments

american-robin-920.jpg

round robin
DNS round-robin is mapping multiple servers to the same hostname and really has nothing to do with the charming variety shown here.

Simple Load Balancing with DNS on Linux

When you have server back ends built of multiple servers, such as clustered or mirrowed web or file servers, a load balancer provides a single point of entry. Large busy shops spend big money on high-end load balancers that perform a wide range of tasks: proxy, caching, health checks, SSL...
Read 0 Comments

dnsmasq.jpg

dnsmasq
Learn how to configure DNS and DHCP, using Dnsmasq in this networking tutorial.

DNS and DHCP with Dnsmasq

Last week, we learned a batch of tips and tricks for Dnsmasq. Today, we're going more in-depth into configuring DNS and DHCP, including entering DHCP hostnames automatically into DNS, and assigning static IP addresses from DHCP. You will edit three configuration files on your Dnsmasq server: /etc/...
Read 0 Comments

banner_3.25.47_pm.png

dnsmasq
In this tutorial, Carla Schroder looks at advanced configuration file management, how to test your configurations, and other tips and tricks.

Advanced Dnsmasq Tips and Tricks

Many people know and love Dnsmasq and rely on it for their local name services. Today we look at advanced configuration file management, how to test your configurations, some basic security, DNS wildcards, speedy DNS configuration, and some other tips and tricks. Next week, we'll continue with a...
Read 0 Comments

How to Set Up Private DNS Servers with BIND on Ubuntu 16.04

BIND (Berkeley Internet Name Domain) is the most used DNS software over the Internet. The BIND package is available for all Linux distributions, which makes the installation simple and straightforward. In today’s article we will show you how to install, configure and administer BIND 9 as a private...
Read 0 Comments

krack-security.jpg

KRACK
The recent KRACK vulnerability targets the link between your device and the Wi-Fi access point, which is probably a router either in your home, your office, or your favorite cafe. These tips can help improve the security of your connection.

Tips to Secure Your Network in the Wake of KRACK

The KRACK attacks vulnerability is now more than 48 hours old and has been discussed in detail on a number of technology-related sites, so I won’t repeat the technical details of the attack here. To summarize: A flaw in the WPA2 wireless handshake protocol allows attackers to sniff or manipulate...
Read 2 Comments

Pages

Click Here!