Liam

DKIM record

DKIM record: Definition & Details

DKIM record is a one really important DNS record type that you should know. So, today we will explore it. First, we will explain what it stands for and then how it functions. Finally, we will see its benefits. So, let’s start. 

What does DKIM stand for?

A security standard for domains to sign outgoing emails through cryptographic authentication is the DKIM record, or DomainKeys Identified Mail. Domains can then show that the emails coming from their end are legitimate in this way. They are hence reliable. Additionally, the DKIM record secures communications to prevent tampering with them while in transit (sending server-recipient server).

Continue reading…

Teardrop attack

What is a Teardrop attack?

Computing technology is an exciting world that boosts creativity in different directions. Unfortunately, malicious people are part of the environment, and they constantly innovate the methods for getting fun, popularity, or profit their way. As a result, the variety of attacks is huge already. Teardrop attack is one choice of the wide attacks’ menu.

What is a DoS attack?

Denial of Service (DoS) is an attack that aims to shut down either a machine or a network by making it inaccessible to users. There are different techniques to reach that evil objective. One is via big loads of traffic for flooding the target until it gets very sluggish and finally stops working. Another, overloading with requests and data, or the sending of malicious information, bugs for exploiting vulnerabilities or destabilizing the machine or network until it crashes. 

DoS attacks have different motivations. Sometimes they are used to sabotage businesses, ask for money for the ransom of a company, protest against a political or social measure, show power, and distract the target for doing something worse like stealing sensitive data. 

What is a Teardrop attack?

Teardrop attack belongs to the category of DoS attacks. A Teardrop attack works by sending altered packets to a target (computer, server, network). The receiver machine (target) conflicts because it can’t put together the packets in the correct sequence. Usually, a bug is used to exploit a TCP/IP vulnerability affecting its reassembly feature or TCP/IP fragmentation codes. Then, after failing continuously while trying to reconstruct the packets properly, an overlapping of them takes place, producing the target crash. 

How does Teardrop attack work?

Continue reading…

DNS tunneling attack: What do you need to know?

The topic of this article is the DNS tunneling attack. First, we will explore it in detail. Then you’ll be able to confidently assert that you know what it does and why it’s so harmful. So, without further ado, let’s get started.

DNS tunneling attack – definition

DNS Tunneling attack is cybercriminal activity. As the name implies, it is the Domain Name System attack type. Its method of operation is simple. DNS queries and responses encode the data of other programs or protocols, most often malicious. This gives attackers a covert command and control route as well as a way to steal data.

Continue reading…

Managed DNS

Managed DNS: What is it and why to use it?

Managed DNS is a very handy tool for managing your Domain Name System. We are all conscious of the importance of DNS. There would be no Internet without it! Nonetheless, the common question is, should it go beyond the minimum? Yes, if you want to improve the resolution of your domain, it is advisable to implement a Managed DNS service. But why this is necessary, we will see today in our article. 

What does Managed DNS mean?

Managed DNS is a very convenient service that allows you to manage your DNS data. It is mostly offered by specialized firms, also known as hosting companies. When you choose a provider and, therefore, the right plan for you, you will access their servers. In fact, thanks to them, you will be able to manage your data, namely to implement Managed DNS.

Continue reading…

PaaS

What is PaaS used for?

What is PaaS?

Platform-as-a-service, also commonly called PaaS, is a type of cloud computing. It is one level above reacher in functionality rather than the IaaS (infrastructure-as-a-service). It provides a great opportunity for clients. They receive an entire platform for running and developing applications. Additionally, they don’t have to take any care of the developing conditions or the whole infrastructure.

Continue reading…

FTP (File Transfer Protocol)

​What is FTP (File Transfer Protocol)?

​FTP (File Transfer Protocol) definition

FTP (File Transfer Protocol) is a communication protocol designed for file transfer between a client and a server. FTP is a standard Internet protocol and uses TCP/IP for transferring the file from one device to another. It was created in 1971 (RFC 114) by Abhay Bhushan. Later it was updated in 1980, adding the TCP/IP compatibility. Finally, and some years later, in 1985, we got to the current version.

With the time IPv6 support was added, and so was added security extension for FTP. 

FTP was used straight off the Command Prompt or Terminal in the past since there was no graphic user interface (GUI). Now, there are FTP server applications and FTP client applications, both for computers and mobile devices, that provide a GUI.

Continue reading…

DNS MX record

What is a DNS MX record?

The DNS MX record is one of the most used DNS records out there. Without it, you simply can’t be sure that you will receive any emails! You need the DNS MX record to signalize to the rest of the servers on the Internet, which exactly is your mail server responsible for receiving emails for the particular domain.

What is a DNS MX record?

The DNS MX record (Mail Exchanger) is a DNS resource record that identifies the host with its hostname and is responsible for receiving incoming emails for the particular domain name. It makes that connection between the domain name and the incoming mail server.

If you have yourdomain.com, you can set the MX record with the following parameters:

  • Host: yourdomain.com – your domain name.
  • Points to: mail.yourdomain.com – hostname of your receiving email server
  • Priority: 10 – the priority value could be from 0 to 100, where a smaller number indicates that it has a higher priority.
  • TTL: Time to live value.

How to create a DNS MX record?

Continue reading…

ALIAS record

ALIAS record: Why do you need it?

ALIAS record is one of the not-so-popular DNS records, but it is also very interesting. So let’s explain a little bit more about it.

ALIAS record explained.

The ALIAS record is a DNS record, which helps with linking two hostnames. Simply it is explaining that one of the hostnames is just another way to write the other one. This DNS record is not one of the standard ones, and actually, not every Managed DNS provider is offering it. The main benefit that comes with applying this record is that it can coexist with other DNS records, such as MX record. For example, the CNAME record is not able to do the same. Another amazing thing about it is that it will take a lot less time and present the other hostname and IP address.

Continue reading…

DNS propagation

DNS propagation – meaning

DNS propagation is a part of the challenging game, which the Internet is. When you are managing a network or a website, it will require regular changes to your strategy. Developing a more efficient, visible, competitive experience is the common reason for the change. For this to happen, administrators have to perform DNS modifications.

What is DNS propagation?

DNS propagation is the process of updating and spreading all of the new modifications you make in the Domain Name System (DNS). And that is all over the network. 

Continue reading…

Dig command

How to use the Dig command?

What does the Dig command mean?

Domain Information Groper is the abbreviation in the DIG command. It is a software that has the purpose of getting information about a domain. It can help you with detecting a problem with your domain. Simply by performing different DNS probing. You can see an individual DNS record or check a name server. 

How to use it?

Continue reading…