April 2021

Host command

Host command explained

What is Host command?

The Host command is a tool with a command-line interface for Domain Name System lookups. You can use it straight from the Terminal application since it is usually pre-installed on Linux-based and Unix-based OSes. You can use it on Ubuntu, CentOS, macOS, or others, without any difference in syntax or functionality?

Who created the command?

Continue reading…

DMARC record

DMARC record explained

What is DMARC?

DMARC is an abbreviation of Domain-based Message Authentication Reporting and Conformance, and it is a mechanism for secure email exchange that uses both SPF and DKIM. Having set up DMARC properly for your domain will reduce email phishing (thanks to the reporting of SPF) and spoofing (thanks to the encryption of DKIM). You will have a lot higher email sent success rate, and fewer emails of yours will end up in the spam folder.

Using DMARC will allow you to add an extra level of security on top of the SPF and DKIM.

You can set it up stronger, and even if SPF and DKIM pass, the DMARC still fails because of criteria.

You can make it lighter and limit the use to only SPF or only DKIM.

Why use it?

  1. To send emails uninterrupted. The emails will be encrypted, and the receiver will be able to unlock them with the public key. The presence of DMARC will indicate that the domain could be trusted.
  2. To stop others from using your domain name for phishing attacks. DMARC has the power to tell to the receiving servers – the domain is related to those particular servers. Anything different should be discarded immediately. It can work with allowing only good emails or stopping all bad emails, or both.

How to create a DNS DMARC record?

Continue reading…

IPAM IP Address Management

What is IPAM (IP Address Management)?

Do you remember when the Internet meant a connection to a desktop computer? Later laptops came to your business, followed by tablets, printers, and all your colleagues’ smartphones, etc. Have you considered how many devices are looking for Internet connection in your business facilities right now?

And this happens daily all around the world. The number of devices grows in such a way that managing networks are getting very complex. Just IP addresses’ assignation or tracking can take a lot of time. And network administrators have so many more tasks to comply with.

To do this manually is not really a choice. In such a scenario, IP address management (IPAM) is very convenient for you.

Continue reading…

Teardrop attack

What is a Teardrop attack?

Computing technology is an exciting world that boosts creativity in different directions. Unfortunately, malicious people are part of the environment, and they constantly innovate the methods for getting fun, popularity, or profit their way. As a result, the variety of attacks is huge already. Teardrop attack is one choice of the wide attacks’ menu.

What is a DoS attack?

Denial of Service (DoS) is an attack that aims to shut down either a machine or a network by making it inaccessible to users. There are different techniques to reach that evil objective. One is via big loads of traffic for flooding the target until it gets very sluggish and finally stops working. Another, overloading with requests and data, or the sending of malicious information, bugs for exploiting vulnerabilities or destabilizing the machine or network until it crashes. 

DoS attacks have different motivations. Sometimes they are used to sabotage businesses, ask for money for the ransom of a company, protest against a political or social measure, show power, and distract the target for doing something worse like stealing sensitive data. 

What is a Teardrop attack?

Continue reading…