Farelf Posted July 26, 2008 Share Posted July 26, 2008 Thanks to paradoX at GRC for this ("This is the personal blog for security researcher Dan Kaminsky ..."): http://www.doxpara.com/ (... and if your browser renders the first part of this as black on black too, just hit "Select all"). For those, like me, of the non-technical persuasion wondering about the recent background rumblings about "DNS vulnerability", mutterings of "cache poisoning" and other esoterica of worrisome complexion ... but with sufficient interest to look around a little. [on edit] The link to that particular explanation is http://www.doxpara.com/?p=1185 (no longer at the top of the page entry). And the "black on black" issue is fixed Link to comment Share on other sites More sharing options...
Farelf Posted July 28, 2008 Author Share Posted July 28, 2008 Also to note, that linked site also includes a DNS checker (that was its initial role) DNS Checker Recently, a significant threat to DNS, the system that translates names you can remember (such as www.doxpara.com) to numbers the Internet can route (66.240.226.139) was discovered, that would allow malicious people to impersonate almost any website on the Internet. Software companies across the industry have quietly collaborated to simultaneously release fixes for all affected name servers. To find out if the DNS server you use is vulnerable, click below. (May not work with some paranoid browser settings). Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.