You may have noticed over the last few days a group of new Device Support Bundles uploaded to the site. They include:
It's an unfortunate fact of life that name servers are exploited by malware. Malware queries name servers to map the domain names that identify their command and control channel to IP addresses. Malware uses DNS as a channel over which to transmit new code. And some malware targets name servers with distributed denial of service attacks.
The latest versions of BIND, however, enable DNS administrators to turn the tables on malware.
In recent years, Denial of Service (DoS) and Distributed Denial of Service attacks (DDOS) have been evolving in terms of sophistication and potency. According to a recent report by Prolexic, the number of attacks in Q2 2012 doubled compared to Q1 2011. The report indicates the top three attacks continue to be SYN floods, UDP floods, and ICMP floods. There is also a significant up take in the number of DNS floods. DNS floods are generally used for both attacking the Internet infrastructure and the DNS application.
Is there any recommendations regarding design if we want to enable Dynamic DNS for the 40 000 client computers. Our Infoblox appliances are all well connected to our network with good connectivity. Our IT-staff responsible of the implementation of the product at my workplace wants to create separate DNS zones for each geographical location and make the client computers at each location dynamic register there name and IP in right Dns zone for that site.
As bloxHub continues to grow and create its own identity, we have received a number of exciting messages from users about the user interface, site design, content updates, and other messages. It's great to receive this feedback; suggesting we're on the right track in providing what you, our users, need to be successful.