NEVER GET BLOCKED AGAIN!
  • Fastest USA IPs in the industry
  • Unrivaled connection strength
  • All application compatible
  • Easy to use software
  • Anonymous browsing

Before your DNS servers lock up it is time to patch BIND

Domain Name System (DNS) security problems have lately been causing important Distributed Denial of Service (DDoS) attacks. After in 2016, the biggest DDoS attack knocked on tens-of-thousands of sites off the internet. Thus, when the Internet Systems Consortium (ISC) releases patches for three important BIND DNS security issues, you should patch it……
BIND is the most famous web DNS server. Like all DNS servers, it interprets human-readable domain names, including www.zdnet.com, into IP addresses. It is additionally used in nearly all Linux and Unix-based servers. In a nutshell, in the event you are running DNS, particularly on Linux, you are running BIND.

In recursive manner, by querying upstream important DNS servers when it can not find an answer in its local cache, the BIND server attempts to work out the address. Important DNS servers are, relatively speaking, more resistant to attacks from these security holes.

By good fortune, most Linux distributions have released patches for this particular trio of problem. I strongly recommend that system administrators patch this “significant” BIND security issue when possible.

by admin on January 25th, 2017 in DNS

There are no comments.

Name: Website: E-Mail:

XHTML: You can use these tags:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>
Show Buttons
Hide Buttons