Before DNS (Domain Name System) hit the networking scene in 1984, a text file called HOSTS.TXT was manually maintained and shared by Stanford Research Institute for the ARPANET (Advanced Research Projects Agency Network). The file mapped networks, gateways, and host names to IP address for member organizations. Check it out.
What can AV (Antivirus) software do with the hosts file? Here’s a look at possibly the greatest example.
someonewhocares.org is updated nearly every day. It maps 127.0.0.1 to all different types of sites (shock sites, hijack sites, spyware sites, malware sites, ad sites, spam sites, and more). Scroll and read all the way down. Then, simply copy and paste the text from this site right into your hosts file. Come back for updates from time to time. It’s updated almost every day. That’s what AV software does. AV software maps 127.0.0.1 to known malicious domains. Instead of your machine going to a known malicious domain, you’ll see one of those “this site can’t be reached” messages in your browser window, and this time, it’s a good thing.
Dyn
DDoS attack Friday hits Twitter, Reddit, Spotify and others, Greg Masters, SC MediaMirai botnets linked to massive DDoS attacks on Dyn DNS, Flashpoint says, Teri Robinson, SC MediaResearchers blame Dyn DDoS attack on script kiddies targeting video game company, Darlene Storm, ComputerworldLessons From the Dyn DDoS Attack, Bruce Schneier, Schneier on SecurityAre Mirai DDoS attacks a wake-up call for IoT industry?, Bradley Barth, SC MediaHow the Consumer Product Safety Commission is (Inadvertently) Behind the Internet’s Largest DDoS Attacks, Matthew Prince, CloudfareDNSChanger
How to detect and fix a machine infected with DNSChanger, Topher Kessler, CNETFBI Shuts Down DNSChanger Servers, Chloe Albanesius, PC MagazineISC
ISC to Patch Versions of DHCP Vulnerable to DoS, Chris Brook, ThreatpostCVE-2016-2774: An attacker who is allowed to connect to DHCP inter-server communications and control channels can exhaust server resources, Michael McNally, ISC Knowledge BaseBash Bug Saga Continues: Shellshock Exploit Via DHCP, Akash Sharda, Trend Micro IncorporatedConcepts
How DNSSEC Works, CloudFlareThe DNSSEC Root Signing Ceremony, CloudFlareDNSSEC Complete Howto – How DNSSEC Works, Peter, The Noc CaveDNSSEC – The DNSKEY and DS record, Long-term MemoryKSK Rollover Planning
DNS Root Zone KSK Rollover, Casa de Internet de Latinoamérica y el CaribeDNS Root Zone KSK Rollover, APNICDNSSEC New Root Zone KSK appears on the DNS, Amreesh Phokeer, AFRINICICANN’s KSK Rollover: What You Need to Know, Erin Scherer, TeamARIN2017 Root Key Rollover – What Does it Mean for BIND Users, ISCThe DNS Root Zone Key-Signing Key is Changing, Mirjam Kühne, RIPE NCCKSK Rollover Postponement
ICANN Postpones DNSSEC Root KSK Rollover – October 11 will NOT be the big day, Dan York, Internet SocietyKSK Rollover Postponed, ICANNRoot Zone KSK Rollover is Postponed, Duane Wessels, VeriSign, Inc.DNSSEC Key Rollover Delayed to Prevent Users Going Offline, Eduard Kovacs, SecurityWeekICANN’s internet DNS security upgrade apparently goes off without a glitch, Michael Cooney, Network World转载于:https://www.cnblogs.com/sec875/articles/10028825.html