Podcasts about Domain Name System

Hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network

  • 82PODCASTS
  • 100EPISODES
  • 56mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Mar 30, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Domain Name System

Latest podcast episodes about Domain Name System

Breaking Badness
DNS Masterclass: Attacks, Defenses, and the Day the Internet Was Saved

Breaking Badness

Play Episode Listen Later Mar 30, 2025 41:17


In this special DNS Masterclass episode of Breaking Badness, hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce take a deep dive into the Domain Name System often dubbed the backbone and battleground of the internet. From its humble beginnings with host files to its critical role in modern security, the episode unpacks DNS's evolution, vulnerabilities, and impact on InfoSec.

The Gate 15 Podcast Channel
The Gate 15 Interview EP 55. Allan Liska, Ransomware Sommelier. Threats, mental health, comic books and Diet Dr. Pepper

The Gate 15 Podcast Channel

Play Episode Listen Later Feb 24, 2025 37:16


In this episode of The Gate 15 Interview, Andy Jabbour speaks with Allan Liska. Allan Liska, threat intelligence analyst at Recorded Future, has more than 20 years of experience in information security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organisations improve their security posture using more effective intelligence. He is the author of “The Practice of Network Security, Building an Intelligence-Led Security Program”, “Securing NTP: A Quickstart Guide” and the co-author of “DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.“, and “Ransomware: Understand. Prevent. Recover.” Learn more about Allan on LinkedIn.In the discussion Allan and Andy discuss: Allan's Background. Evolving Threats, mission creep and STDs (wait, what?) The ever-evolving threat of Ransomware and the value of collaboration Resilience: mental health, taking care of your people Roy Rogers, comic books and that's before we play Three Questions! The enduring and expensive threat of scams (#Take9!) Lots more!“Your data isn't going to be deleted.”Selected links: Recorded Future Green Archer

BuzzZoom
BZ085 Domain Name System

BuzzZoom

Play Episode Listen Later May 10, 2024 65:16


Was bedeutet eigentlich Domain Name System?

InfosecTrain
DNS Protocols and Attacks

InfosecTrain

Play Episode Listen Later May 8, 2024 5:33


The Domain Name System, or DNS, is the backbone of the internet, translating human-readable domain names into numerical IP addresses that computers use to locate services and devices worldwide. Despite DNS's importance, it is susceptible to cyber attacks due to its weaknesses. The purpose of this article is to explain the fundamentals of DNS protocols. It will also go into detail about the most common DNS attacks, along with effective mitigation strategies. Overview of DNS Protocols DNS operates as a distributed database hierarchy organized into a tree-like structure. The key components of DNS include: View More: DNS Protocols and Attacks

Unofficial SAP on Azure podcast
#188 - The one with Azure DNS Service & Hybrid Networking for SAP​ (Konstantin Popov & Evren Buyruk) | SAP on Azure Video Podcast

Unofficial SAP on Azure podcast

Play Episode Listen Later Apr 19, 2024 57:19


In episode 188 of our SAP on Azure video podcast we talk about about DNS, Domain Name System. DNS acts like a phonebook to resolve IP addresses through their domain names. When something goes wrong, then often the whole network communication breaks down. It's always DNS! Who doesn't know this term whenever it comes to networking issues. In a lot of cases we see customers using Azure DNS Services in the context of hybrid networking with SAP  scenarios -- both Azure native and RISE with SAP. Since this can become quite complicated, I am happy to have two experts with us today again: Evren and Konstantin. https://www.linkedin.com/feed/update/urn:li:activity:6841398577495977984/Find all the links mentioned here: https://www.saponazurepodcast.de/episode188Reach out to us for any feedback / questions:* Robert Boban: https://www.linkedin.com/in/rboban/* Goran Condric: https://www.linkedin.com/in/gorancondric/* Holger Bruchelt: https://www.linkedin.com/in/holger-bruchelt/ #Microsoft #SAP #Azure #SAPonAzure #DNS #Networking #RISEwithSAP

Everything Everywhere Daily History Podcast

Behind almost every web page, email, and podcast is a system that translates addresses understandable to humans to something which can be understood by computers.  The system is one of the foundations of the Internet, yet its origin was in a handmade list that was placed on a single computer.  Unbeknownst to the creators of the system, it would eventually affect the fortunes of entire countries.  Learn more about the Domain Name System, how it originated, and how it works, on this episode of Everything Everywhere Daily. Sponsors Sign up today at butcherbox.com/daily and use code daily to choose your free offer and get $20 off. Visit BetterHelp.com/everywhere today to get 10% off your first month. Use the code EverythingEverywhere for a 20% discount on a subscription at Newspapers.com. Subscribe to the podcast!  https://link.chtbl.com/EverythingEverywhere?sid=ShowNotes -------------------------------- Executive Producer: Charles Daniel Associate Producers: Peter Bennett & Cameron Kieffer   Become a supporter on Patreon: https://www.patreon.com/everythingeverywhere Update your podcast app at newpodcastapps.com Discord Server: https://discord.gg/UkRUJFh Instagram: https://www.instagram.com/everythingeverywhere/ Facebook Group: https://www.facebook.com/groups/everythingeverywheredaily Twitter: https://twitter.com/everywheretrip Website: https://everything-everywhere.com/ Learn more about your ad choices. Visit megaphone.fm/adchoices

This Week in Amateur Radio
PODCAST: This Week in Amateur Radio #1297

This Week in Amateur Radio

Play Episode Listen Later Jan 6, 2024


PODCAST: This Week in Amateur Radio Edition #1297 Release Date: January 6, 2024 Here is a summary of the news trending This Week in Amateur Radio. This week's edition is anchored by Denny Haight, NZ8D, Patrick Huba, N2WWW, Dave Wilson, WA2HOY, Don Hulick, K2ATJ, Rich Lawrence, KB2MOB, Will Rogers, K5WLR, Eric Zittel, KD2RJX, Chris Perrine, KB2FAF, George Bowen, W2XBS, and Jessica Bowen, KC2VWX. Produced and edited by George Bowen, W2XBS. Approximate Running Time: 1:47:47 Trending headlines in this week's bulletin service: Podcast Download: https://bit.ly/TWIAR1297 Trending headlines in this week's bulletin service 1. AMSAT: Satellite Shorts From All Over 2. Christmas Drop Operations From Guam Not The North Pole 3. QRP Satellite Now In Orbit 4. ARRL: Teenage Hams On NBC's TODAY Show 5. ARRL: HamSCI 2024 Workshop Upcoming 6. ARRL: ARISS Announces The Schools And Organizations Selected For Contacts With The ISS Crew 7. ARRL: YouTube Telethon Raises Money For Leagues Teachers Institute 8. ARRL: Radio Luxembourg Celebrated 90th Anniversary 9. Expanded Frequency Use Worldwide Expands To Include Mobile Base Stations 10. Free Online Seminars For Extra Class Is Offered By Electronics Museum 11. Sri Lankan Amateurs Recall Help Provided During Tsunami Disaster 12. Conference In India Welcomed Satellite Enthusiasts 13. Vintage Equipment From KW Electronics Is Celebrated On The Bands 14. Veteran Broadcaster Charles Edward Rich, W8GCW, SK 15. FCC Opens 2024 Hunting Pirate Broadcasters In New York City 16. ARRL Kids Day is coming up. The specifications for Kids Day. 17. Upcoming Contests and ARRL Conventions and HamFests 18. Monthly Volunteer Monitor Program Report 19. Inside The Magic Radio Protecting Russian Drones From Jamming 20. ARRL: ARRL's Year Of The Volunteer Declared A Success 21. KPH To Broadcast an Over The Air Cryptographic Challenge 22. Publication Is Suspended At CQ Magazine 23. Year Long Ten Meter Challenge Is Set For SOTA Activators 24. Eastern New York Section News - Office Changes for 2024 Plus these Special Features This Week: * Our technology reporter Leo Laporte, W6TWT will be here to explain domain names and how the Domain Name System works. * Working Amateur Radio Satellites with Bruce Paige, KK5DO - AMSAT Satellite News * Foundations of Amateur Radio with Onno Benschop VK6FLAB, will talk about how to Find The Right Frequency - How allocations differ around the world. * The DX Corner with Bill Salyers, AJ8B with news on DXpeditions, DX, upcoming contests and more. * Weekly Propagation Forecast from the ARRL * Our new amateur radio historian, Will Rogers, K5WLR returns with the third edition of our new history series entitled, A Century of Amateur Radio. This week, Will sets The Wayback Machine to the early 1900's and how the very first radio regulations were put in place, and ended the era of free range hams. ----- Website: https://www.twiar.net X: @twiar Facebook: https://www.facebook.com/groups/twiari RSS News: https://twiar.net/?feed=rss2 Automated: https://twiar.net/TWIARHAM.mp3 (Static file, changed weekly) ----- Visit our website at www.twiar.net for program audio, and daily for the latest amateur radio and technology news. You can air This Week in Amateur Radio on your repeater! Built in identification breaks every 10 minutes or less. This Week in Amateur Radio is heard on the air on nets and repeaters as a bulletin service all across North America, and all around the world on amateur radio repeater systems, weekends on WA0RCR on 1860 (160 Meters), and more. This Week in Amateur Radio is portable too! The bulletin/news service is available and built for air on local repeaters (check with your local clubs to see if their repeater is carrying the news service) and can be downloaded for air as a weekly podcast to your digital device from just about everywhere. This Week in Amateur Radio is also carried on a number of LPFM stations, so check the low power FM stations in your area. You can also stream the program to your favorite digital device by visiting our web site www.twiar.net. Or, just ask Siri, Alexa, or your Google Nest to play This Week in Amateur Radio! This Week in Amateur Radio is produced by Community Video Associates in upstate New York, and is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. If you would like to volunteer with us as a news anchor or special segment producer please get in touch with our Executive Producer, George, via email at w2xbs77@gmail.com. Also, please feel free to follow us by joining our popular group on Facebook, and follow our feed on X! Thanks to FortifiedNet.net for the server space! Thanks to Archive.org for the audio space.

popular Wiki of the Day
Web hosting service

popular Wiki of the Day

Play Episode Listen Later Dec 28, 2023 2:07


pWotD Episode 2430: Web hosting service Welcome to popular Wiki of the Day where we read the summary of a popular Wikipedia page every day.With 2,402,055 views on Wednesday, 27 December 2023 our article of the day is Web hosting service.A web hosting service is a type of Internet hosting service that hosts websites for clients, i.e. it offers the facilities required for them to create and maintain a site and makes it accessible on the World Wide Web. Companies providing web hosting services are sometimes called web hosts.Typically, web hosting requires the following:one or more servers to act as the host(s) for the sites; servers may be physical or virtualcolocation for the server(s), providing physical space, electricity, and Internet connectivity;Domain Name System configuration to define name(s) for the sites and point them to the hosting server(s);a web server running on the host;for each site hosted on the server:space on the server(s) to hold the files making up the sitesite-specific configurationoften, a database;software and credentials allowing the client to access these, enabling them to create, configure, and modify the site;email connectivity allowing the host and site to send email to the client.This recording reflects the Wikipedia text as of 01:31 UTC on Thursday, 28 December 2023.For the full current version of the article, see Web hosting service on Wikipedia.This podcast uses content from Wikipedia under the Creative Commons Attribution-ShareAlike License.Visit our archives at wikioftheday.com and subscribe to stay updated on new episodes.Follow us on Mastodon at @wikioftheday@masto.ai.Also check out Curmudgeon's Corner, a current events podcast.Until next time, I'm Brian Neural.

This Week in Enterprise Tech (Video HD)
TWiET 572: DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System

This Week in Enterprise Tech (Video HD)

Play Episode Listen Later Dec 9, 2023 73:10


Proxy trojan targets macOS users for traffic redirection Indoor navigation has had a slow start Krasue RAT uses cross-kernel Linux rootkit to attack telecoms U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of Infoblox, to talk about external authoritative DNS - whether enterprises should fully manage their own external DNS or use managed services, threats like domain hijacking, using load balancers, and more. Hosts: Curtis Franklin and Brian Chee Guests: Josh Kuo and Ross Gibson Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT lookout.com vanta.com/ENTERPRISE

This Week in Enterprise Tech (MP3)
TWiET 572: DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System

This Week in Enterprise Tech (MP3)

Play Episode Listen Later Dec 9, 2023 73:10


Proxy trojan targets macOS users for traffic redirection Indoor navigation has had a slow start Krasue RAT uses cross-kernel Linux rootkit to attack telecoms U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of Infoblox, to talk about external authoritative DNS - whether enterprises should fully manage their own external DNS or use managed services, threats like domain hijacking, using load balancers, and more. Hosts: Curtis Franklin and Brian Chee Guests: Josh Kuo and Ross Gibson Download or subscribe to this show at https://twit.tv/shows/this-week-in-enterprise-tech. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: canary.tools/twit - use code: TWIT lookout.com vanta.com/ENTERPRISE

Hemispheric Views
099: AaaS! (Adam as a Service)

Hemispheric Views

Play Episode Listen Later Nov 30, 2023 57:17


Hemispheric Views
088: I Don't Like The Residue!

Hemispheric Views

Play Episode Listen Later Jun 29, 2023 54:13


It's a call-in show now?! Someone else fell into the trap of sending in a desk to be reviewed! More talk about Windows than you would ever imagine. Finally, a little reflection on the show and a board meeting to decide if we keep going! Podcast Shout-out! 00:00:00 Hi, Robb!

This Week in Amateur Radio
PODCAST: This Week in Amateur Radio #1264

This Week in Amateur Radio

Play Episode Listen Later May 21, 2023


PODCAST: This Week in Amateur Radio Edition #1264 Release Date: May 20, 2023 Here is a summary of the news trending This Week in Amateur Radio. This week's edition is anchored by Terry Saunders, N1KIN, Denny Haight, NZ8D, Don Hulick, K2ATJ, Dave Wilson, WA2HOY, Will Rogers, K5WLR, Eric Zittel, KD2RJX, Bob Donlon, W3BOO, George Bowen, W2XBS, and Jessica Bowen, KC2VWX. Produced and edited by George Bowen, W2XBS. Approximate Running Time: 1:55:43 - * Dayton HamVention Weekend Edition * Trending headlines in this weeks bulletin service: Podcast Download: https://bit.ly/TWIAR1264 Trending headlines in this week's bulletin service: 1. Congresswoman Lesko Reintroduces Bill to Replace Symbol Rate Limit with Bandwidth Limit 2. Call For Nominations – 2023 AMSAT Board of Directors Election 3. National Hurricane Center Amateur Radio Station Annual Test 4. Dayton Hamvention 2023: Ready! 5. ARRL Member Dues Survey Continues 6. Marc Tarplee, N4UFP, Section Manager of the ARRL South Carolina Section (SK) 7. NASA Astronaut Contacts Two Schools from the International Space Station 8. 25th Anniversary Of The May 31st 1998 F3 Tornado In Mechanicville, New York 9. Former Chairman Of The FCC Newton Minow, Passes At 97 10. Antenna Issue Is Resolved For Juice Mission Around Jupiter 11. Amateurs Have An Opportunity To Work The Big Race 12. China's XW-2A Satellite Decays From Orbit 13. The UK Special Coronation Event Stations Are Still On The Air Through June 14. Red River Valley Texas Amateur Radio Club To Celebrate 50th Anniversary 15. Biden Intends to Pick Lawyer Anna Gomez for FCC to End Agency Deadlock 16. The FCC Moves To Potentially Open 1000 MegaHertz Of Spectrum To New Commercial Uses 17. FCC Rejects Dish 5G Plan That Could Have Made Starlink Broadband Unusable 18. Upcoming Conventions, Hamfests and Contests. 19. Saudi Arabia To Launch Largest Radio Telescope In The Middle East 20. ARRL helps amateurs comply with new RF exposure evaluation 21. Amateurs in the Caribbean area gear up for the upcoming storm season Plus these Special Features This Week: * Our technology reporter Leo Laporte, will describe the workings of the DNS, or Domain Name System of internet addressing. And will tell us about dotted quads. * Working Amateur Radio Satellites with Bruce Paige, KK5DO - AMSAT Satellite News * Tower Climbing and Antenna Safety w/Greg Stoddard KF9MP, concludes his six part series on producing a successful Public Service Announcement for air on broadcast radio to help promote your latest club event or hamfest. * Foundations of Amateur Radio with Onno Benschop VK6FLAB, will describe how you can measure the Solar Flux Index at home. * Weekly Propagation Forecast from the ARRL * Bill Continelli, W2XOY - The History of Amateur Radio. Bill returns to begin his series, The Ancient Amateur Archives, this week, Bill takes us back to the year 1980. That's the year that brought new HF band allocations to amateurs world wide as a result of the World Administrative Radio Conference held in Geneva in late 1979. The FCC proposed a sideband only expansion of Citizens Band into the ten and a half meter band, ASCII and packet radio is allowed on the air, and we will learn about the Bash Books and amateur radio testing. * Special interview with Gordon West WB6NOA. Courtesy RAIN/QSO Today ----- Website: https://www.twiar.net Facebook: https://www.facebook.com/groups/twiari/ Twitter: https://www.twitter.com/twiar RSS News: https://twiar.net/?feed=rss2 Automated: https://twiar.net/TWIARHAM.mp3 (Static file, changed weekly) ----- Visit our website at www.twiar.net for program audio, and daily for the latest amateur radio and technology news. Air This Week in Amateur Radio on your repeater! Built in identification breaks every 10 minutes or less. This Week in Amateur Radio is heard on the air on nets and repeaters as a bulletin service all across North America, and all around the world on amateur radio repeater systems, weekends on WA0RCR on 1860 (160 Meters), and more. This Week in Amateur Radio is portable too! The bulletin/news service is available and built for air on local repeaters (check with your local clubs to see if their repeater is carrying the news service) and can be downloaded for air as a weekly podcast to your digital device from just about everywhere. This Week in Amateur Radio is also carried on a number of LPFM stations, so check the low power FM stations in your area. You can also stream the program to your favorite digital device by visiting our web site www.twiar.net. Or, just ask Siri, Alexa, or your Google Nest to play This Week in Amateur Radio! This Week in Amateur Radio is produced by Community Video Associates in upstate New York, and is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. If you would like to volunteer with us as a news anchor or special segment producer please get in touch with our Executive Producer, George, via email at w2xbs77@gmail.com. Also, please feel free to follow us by joining our popular group on Facebook, and follow our feed on Twitter! Thanks to FortifiedNet.net for the server space! Thanks to Archive.org for the audio space.

Breaking Through in Cybersecurity Marketing
Empathy and Marketing Soft Skills with Kelsey LaBelle

Breaking Through in Cybersecurity Marketing

Play Episode Listen Later Feb 22, 2023 46:11


This week, Kelsey LaBelle joins hosts Gianna and Maria to talk about marketing soft skills and returning to empathy in the workplace. Kelsey, who is the VP of Marketing at DomainTools, also shares how she works soft skills in her role at the company. Along with the emotional skills, Kelsey goes into creative ways to generate lead pipelines, why you should build trust with an audience, and shares the nuts and bolts of podcast production. Listen in for some deep talk on marketing—and lots of puns!   Timecoded Guide: [07:28] Wrapping uniqueness and empathy into marketing [15:26] Building lead pipelines with domain blooms  [32:00] Podcast workflow and process of production  [34:45] Can you be happy at work?   [36:04] Closing with the guessing game   ---------- Definitions:  DDoS: DDoS or DDoS'ing stands for ‘denial of service attack.” This is a cyberattack in which the perpetrator attempts to render a network resource unavailable to its users by disrupting the services of a host connected to the network.  SANS: SANS stands for SysAdmin, Audit, Network, and Security and is the world's largest cybersecurity research and training organization. DNS: DNS stands for Domain Name System which makes the internet accessible by allowing the use of domain names. ----------- Links: Spend some time with Kelsey on Mastodon and Twitter @punsandrosess Follow Kelsey on LinkedIn. Visit DomainTools on LinkedIn and Twitter. Check out the DomainTools website. Tune into the Breaking Badness podcast. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Gianna on LinkedIn. Catch up with Maria on LinkedIn. Join the Cybersecurity Marketing Society on our website, and keep up with us on Twitter.

Bitcoin, Blockchain, and the Technologies of Our Future

https://youtu.be/a2RjbvMES-0https://open.lbry.com/@NaomiBrockwell:4/DNS-v6-ODYSEE:1Your home internet has a privacy problem! DNS, or Domain Name System, is the lookup system responsible for converting human-readable domain names like google.com into IP addresses, which is the format that computers need to communicate with each other. But in this process, a LOT of data is leaked about your internet activities, and collected by all kinds of entities like ISPs and government organizations.In this video, we'll explain how DNS works, and how to set up your DNS to make your internet browsing far more private.00:00 Intro00:37 What is DNS?01:09 How Does DNS Work?07:02 Privacy Concerns09:07 How to Protect DNS Queries10:14 Quad913:50 How to Switch to Quad915:33 ConclusionDNS privacy is a critical part of your home network security. Take 5 minutes to create more private DNS settings. Special thanks to John Todd, Brent Cowing, Kieran Mesquita, and Alex Wied for their help with this video!Video 1 in our home networking series: https://www.youtube.com/watch?v=QPCbri1EJ8UVideo 2 in our home networking series: https://www.youtube.com/watch?v=yKyjbeObQXgBrought to you by NBTV members: Lee Rennie, Sam Ettaro, Will Sandoval, and Naomi Brockwell.To support NBTV, visit https://www.nbtv.media/support(tax-deductible in the US)NBTV's new eBook out now!Beginner's Introduction To Privacy - https://amzn.to/3WDSfkuBeware of scammers, I will never give you a phone number or reach out to you with investment advice. I do not give investment advice.Visit the NBTV website:https://nbtv.mediaSupport the show

Digitaal | BNR
Rode vlaggen voor Facebook, zo doet Nederland mee in streaming-strijd en cyberveiliger met DNS

Digitaal | BNR

Play Episode Listen Later Nov 23, 2022 42:24


De Nederlandse overheid gebruikt (nog steeds) Facebook, maar de vraag is hoe lang nog. Want: een onderzoek naar privacy-risico's op dat platform heeft een boel rode vlaggen opgeleverd. Wat gaat hier precies mis? Dat vragen we aan Sjoera Nas, senior privacy adviseur bij Privacy Company, die dit onderzoek uitvoerde. Kan Videoland flink groeien als Disney+ en Netflix dat nauwelijks doen? De tijd van onbezorgdheid en gouden bergen bij streamingdiensten lijkt voorbij, want de groei is uit de streamingplatforms van Netflix en Disney. Wat betekent dat voor platforms uit Nederland, met als grootste speler RTL's Videoland? Daarover praten we met Arno Otto, in het verleden nauw betrokken bij de oprichting van RTL's streamingplatform en nu Chief Transformation Officer bij Talpa. Cyberveiliger met DNS Slimmer omgaan met het Domain Name System, oftewel DNS, zou een ‘easy win' kunnen zijn voor betere bescherming tegen cyberaanvallen. Maar hoe zou dat in zijn werk gaan? En is het überhaupt uitvoerbaar? Dat bespreken we met Steven van Gysel, Manager Solutions Architect Noord-Europa, bij security- en netwerk-bedrijf Infoblox.  Meer podcasts over tech? Luister dan naar All in the Game, De Technoloog en de Tech Update.See omnystudio.com/listener for privacy information.

Hemispheric Views
071: It's a Neatvember Celebration!

Hemispheric Views

Play Episode Listen Later Nov 17, 2022 53:57


Adam Newbold (a.k.a. Neatnik) of omg.lol (https://home.omg.lol/) returns to the show to discuss some recent developments on his service. Meanwhile, Andrew rolls up his sleeves to offer some top-tier business advice; Jason and Martin back away slowly into a hedge. (https://giphy.com/clips/justin-homer-simpson-bushes-backs-away-cOzyUgoJljvhut2G0E) Neatvember 00:00:00 Piccolo (https://australiancoffeelovers.com.au/what-is-a-piccolo-coffee/) ☕️ Happy Neatvember!

IGeometry
DNS is Beautiful

IGeometry

Play Episode Listen Later Apr 28, 2022 41:49


DNS or Domain Name System, despite its drawbacks, is brilliantly designed for scale. We can learn few lessons from this protocol especially when designing our own apps. This episode of the backend engineering show I go through how DNS works, the pros and the cons and attacks that happened on this system. 0:00 Intro 2:00 Overview DNS 7:40 How DNS works (Details) 15:44 DNS uses UDP 19:30 DNS Poisoning 24:10 is DNS really distributed? 26:30 How Attackers Abuse DNS 30:30 How Chrome overloaded the ROOT servers for 12 years Resources https://blog.apnic.net/2020/08/21/chromiums-impact-on-root-dns-traffic/ https://www.cloudflare.com/learning/dns/what-is-dns/ https://www.cloudflare.com/learning/dns/dns-cache-poisoning/ https://blog.cloudflare.com/sad-dns-explained/ https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610 Fundamentals of Networking for Effective Backends udemy course (link redirects to udemy with coupon) https://network.husseinnasser.com Fundamentals of Database Engineering udemy course (link redirects to udemy with coupon) https://database.husseinnasser.com Introduction to NGINX (link redirects to udemy with coupon) https://nginx.husseinnasser.com --- Support this podcast: https://anchor.fm/hnasr/support

The Actionable Futurist® Podcast
S4 Episode 4: Michael Kaczmarek Former VP Products @ Neustar on the Domain Name System

The Actionable Futurist® Podcast

Play Episode Listen Later Mar 3, 2022 37:16 Transcription Available


When we think about the components that go together to make the internet work we probably think of browsers and IP addresses but there is one critical component that brings it together - the Domain Name System or DNS. It's the reason behind when you type cnn.com you end up on the right website.The design of DNS is more than 30 years old, but still is a critical point of the internet today.In October 2021, a misconfiguration error caused Facebook to disappear from the internet for nearly 7 hours. To understand the notion of DNS better, we spoke with Michael Kaczmarek who is the former VP of Product Management at Neustar Security Solutions. Michael directed the research efforts into distributed denial of service attacks and DNS trends for Neustar working closely with the cross-functional team to publish insights on changes in the cybersecurity landscape.Prior to joining Neustar, Michael was with Verisign for more than 18 years where he served in various capacities including VP of product management and marketing.Prior to Verisign, he was a systems engineering manager for Lockheed Martin in charge of their Solid Rocket Motor Disposition in Russia Program.Michael is a Ponemon Fellow and holds a Bachelor of Science in aerospace engineering from the University of Maryland and a Master of Engineering in environmental engineering from Johns Hopkins University.In this wide-ranging discussion, we looked at How Distributed Denial of Service (DDoS) attacks are on the riseHow AI can be used to detect cyber threatsWhat the Internet 3.0 might look likeWhat the Facebook 2021 outage tells us about DNSWhat to look for in a DNS providerWhy every business owner should care about DNSThe top3 cybersecurity trendsNew threats such as API securityAnalysis of a real DNS hackWhy Cybersecurity needs to concern every boardThree top cybersecurity tipsIf you are truly digitally curious, then you will want to listen to this episode in full.More about MichaelLinkedInTwitterNeustar Security SolutionsYour Host: Actionable Futurist® Andrew GrillFor more on Andrew - what he speaks about and replays of recent talks, please visit ActionableFuturist.comfollow @AndrewGrill on Twitteror @andrew.grill on Instagram.

This Week in Amateur Radio
PODCAST: This Week in Amateur Radio #1196

This Week in Amateur Radio

Play Episode Listen Later Jan 30, 2022


PODCAST: This Week in Amateur Radio Edition #1196 Release Date: January 29, 2022 Here is a summary of the news trending This Week in Amateur Radio. This week's edition is anchored by Terry Saunders, N1KIN, Don Hulick, K2ATJ, Fred Fitte, NF2F, Eric Zittel, KD2RJX, Will Rogers, K5WLR, George Bowen, W2XBS, and Jessica Bowen, KC2VWX. Produced and edited by George Bowen, W2XBS. Approximate Running Time: 2:34:49 Podcast Download: https://bit.ly/TWIAR1196 Trending headlines in this week's bulletin service: 1. Weak Signals Heard From Spanish Satellites EASAT-2 and HADES 2. Centralia, Washington, ARES Team Activates In The Wake of Bombing 3. The Next QSO Today Virtual Ham Expo Set For Mid-March 2022 4. Amateur Radio Digital Communications Grants Continue 5. Puerto Rico Section and Red Cross Puerto Rico Chapter Sign New Memorandum Of Understanding 6. News Briefs - 7 items you need to know 7. QRP Operator Logs One Contact Per Day For Nearly 30 Years 8. A February Webinar Will Discuss Amateur Radio and AUXCOM Support To The US Department of Defense 9. AMSAT-DL Replaces Damaged Satellite Antenna At Antarctic Station 10. Elon Musk SpaceX Rocket On Collision Course With The Moon 11. Amateurs Lose 50 MegaHertz of Spectrum: Operation in 3.45 – 3.5 GigaHertz Segment Must Cease by April 14th, 2022 12. Federal Communications Commission Seeks Attorney-Advisor for its Mobility Division 13. Two Radio Amateurs Appointed to the Federal Communications Commission Technological Advisory Council 14. China Is Expanding Its South China Sea Antenna Farms 15. POTA/SOTA Tallies Up The 2021 Contacts and Activations 16. ARRL Podcast Covers How To Get Started With CW 17. RSGB/Ofcom arranges special callsigns for Queen's Jubilee celebrations 18. NASA satellite catches major solar flare 19. Portugal tracking down radio interference 20. First Svalbard QO-100 Satellite DXpedition 21. St Patrick's Day Award Update Plus these Special Features This Week: * Technology News and Commentary with Leo Laporte, W6TWT, will talk about the internet Domain Name System, he will discuss the recently passed Digital Services Act in the European Union, and he will talk about the mess that has developed between the FAA, the FCC, and the wireless carriers over the recently deployed 5-G network. * Working Amateur Radio Satellites with Bruce Paige, KK5DO - AMSAT Satellite News * Tower Climbing and Antenna Safety w/Greg Stoddard KF9MP, will tell us about the best way to seal coaxial fittings from the elements. * Foundations of Amateur Radio with Onno Benschop VK6FLAB, will discuss what happens when you bring a UpConverter into you life. * Weekly Propagation Forecast from the ARRL * Bill Continelli, W2XOY - The History of Amateur Radio. Bill returns with another edition of The Ancient Amateur Archives, this week, Bill takes a look at amateur radio during World War II in the years 1939 and 1940. * Vance Martin, N3VEM, will have the latest updates from Parks On The Air and Summits On The Air. * SPECIAL THIS WEEK: Courtesy of Eric Guth 4Z1UG, from the QSO Today Podcast, we will hear an interview with Geoffrey Mendenhall, W8GNM. Eric interviews him about his early interest in electronics, germanium transistors, and later, high power triodes led him to a career, as an engineer, designing, building, and managing broadcast transmitters projects for Gates Radio, Broadcast Engineering, and later Harris Broadcast ----- Website: https://www.twiar.net Facebook: https://www.facebook.com/groups/twiari/ Twitter: https://www.twitter.com/twiar RSS News: https://twiar.net/?feed=rss2 iHeartRadio: https://bit.ly/iHeart-TWIAR Spotify: https://bit.ly/Spotify-TWIAR TuneIn: https://bit.ly/TuneIn-TWIAR Automated: https://twiar.net/TWIARHAM.mp3 (Static file, changed weekly) ----- Visit our website at www.twiar.net for program audio, and daily for the latest amateur radio and technology news. Air This Week in Amateur Radio on your repeater! Built in identification breaks every 10 minutes or less. This Week in Amateur Radio is heard on the air on nets and repeaters as a bulletin service all across North America, and all around the world on amateur radio repeater systems, weekends on WA0RCR on 1860 (160 Meters), and more. This Week in Amateur Radio is portable too! The bulletin/news service is available and built for air on local repeaters (check with your local clubs to see if their repeater is carrying the news service) and can be downloaded for air as a weekly podcast to your digital device from just about everywhere, including Acast, Deezer, iHeart, iTunes, Google Play, Spotify, TuneIn, Stitcher, iVoox, Blubrry, Castbox.fm, Castro, Feedburner, gPodder, Listen Notes, OverCast, Player.FM, Pandora, Podcast Gang, Podcast Republic, Podchaser, Podnova, and RSS feeds. This Week in Amateur Radio is also carried on a number of LPFM stations, so check the low power FM stations in your area. You can also stream the program to your favorite digital device by visiting our web site www.twiar.net. Or, just ask Siri, Alexa, or your Google Nest to play This Week in Amateur Radio! This Week in Amateur Radio is produced by Community Video Associates in upstate New York, and is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. If you would like to volunteer with us as a news anchor or special segment producer please get in touch with our Executive Producer, George, via email at w2xbs77@gmail.com. Also, please feel free to follow us by joining our popular group on Facebook, and follow our daily feed on Twitter! Thanks to FortifiedNet.net for the server space! Thanks to Archive.org for the audio space.

Cybersecurity: Amplified And Intensified
Khonsari Ransomware exploiting Log4J/Log4Shell with Allan Liska, CSIRT at Recorded Future - Escalate, Exfiltrate & Encrypt - Round 15

Cybersecurity: Amplified And Intensified

Play Episode Listen Later Dec 17, 2021 15:52


On today's episode Allan Liska of Recorded Future digs into the Khonsari Ransomware sample Eric submitted to Hybrid Analysis. https://www.hybrid-analysis.com/sample/f2e3f685256e5f31b05fc9f9ca470f527d7fdae28fa3190c8eba179473e20789 Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the coauthor of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion. Allan Liska https://www.linkedin.com/in/allan2/ https://twitter.com/uuallan https://recordedfuture.com Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://anchor.fm/amplifiedandintensified/support

Cybersecurity: Amplified And Intensified
Episode 36 - Allan Liska, CSIRT at Recorded Future - Ransomware & Incident Response

Cybersecurity: Amplified And Intensified

Play Episode Listen Later Nov 8, 2021 49:54


Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the coauthor of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.Allan Liskahttps://www.linkedin.com/in/allan2/https://twitter.com/uuallanhttps://recordedfuture.comEric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://anchor.fm/amplifiedandintensified/support

CNN Breaking News Alerts
Facebook's services start coming back online after outage

CNN Breaking News Alerts

Play Episode Listen Later Oct 4, 2021 0:31


Around six hours after Facebook, WhatsApp and Instagram went down, service started coming back online. The reason for the outage was not immediately clear. However, multiple security experts quickly pointed to a Domain Name System problem as a possible culprit. To learn more about how CNN protects listener privacy, visit cnn.com/privacy

The History of Computing
A broad overview of how the Internet happened

The History of Computing

Play Episode Listen Later Jul 12, 2021 29:45


The Internet is not a simple story to tell. In fact, every sentence here is worthy of an episode if not a few.  Many would claim the Internet began back in 1969 when the first node of the ARPAnet went online. That was the year we got the first color pictures of earthen from Apollo 10 and the year Nixon announced the US was leaving Vietnam. It was also the year of Stonewall, the moon landing, the Manson murders, and Woodstock. A lot was about to change. But maybe the story of the Internet starts before that, when the basic research to network computers began as a means of networking nuclear missile sites with fault-tolerant connections in the event of, well, nuclear war. Or the Internet began when a T3 backbone was built to host all the datas. Or the Internet began with the telegraph, when the first data was sent over electronic current. Or maybe the Internet began when the Chinese used fires to send messages across the Great Wall of China. Or maybe the Internet began when drums sent messages over long distances in ancient Africa, like early forms of packets flowing over Wi-Fi-esque sound waves.  We need to make complex stories simpler in order to teach them, so if the first node of the ARPAnet in 1969 is where this journey should end, feel free to stop here. To dig in a little deeper, though, that ARPAnet was just one of many networks that would merge into an interconnected network of networks. We had dialup providers like CompuServe, America Online, and even The WELL. We had regional timesharing networks like the DTSS out of Dartmouth University and PLATO out of the University of Illinois, Champaign-Urbana. We had corporate time sharing networks and systems. Each competed or coexisted or took time from others or pushed more people to others through their evolutions. Many used their own custom protocols for connectivity. But most were walled gardens, unable to communicate with the others.  So if the story is more complicated than that the ARPAnet was the ancestor to the Internet, why is that the story we hear? Let's start that journey with a memo that we did an episode on called “Memorandum For Members and Affiliates of the Intergalactic Computer Network” sent by JCR Licklider in 1963 and can be considered the allspark that lit the bonfire called The ARPANet. Which isn't exactly the Internet but isn't not. In that memo, Lick proposed a network of computers available to research scientists of the early 60s. Scientists from computing centers that would evolve into supercomputing centers and then a network open to the world, even our phones, televisions, and watches. It took a few years, but eventually ARPA brought in Larry Roberts, and by late 1968 ARPA awarded an RFQ to build a network to a company called Bolt Beranek and Newman (BBN) who would build Interface Message Processors, or IMPs. The IMPS were computers that connected a number of sites and routed traffic. The first IMP, which might be thought of more as a network interface card today, went online at UCLA in 1969 with additional sites coming on frequently over the next few years. That system would become ARPANET. The first node of ARPAnet went online at the University of California, Los Angeles (UCLA for short). It grew as leased lines and more IMPs became more available. As they grew, the early computer scientists realized that each site had different computers running various and random stacks of applications and different operating systems. So we needed to standardize certain aspects connectivity between different computers.  Given that UCLA was the first site to come online, Steve Crocker from there began organizing notes about protocols and how systems connected with one another in what they called RFCs, or Request for Comments. That series of notes was then managed by a team that included Elizabeth (Jake) Feinler from Stanford once Doug Engelbart's project on the “Augmentation of Human Intellect” at Stanford Research Institute (SRI) became the second node to go online. SRI developed a Network Information Center, where Feinler maintained a list of host names (which evolved into the hosts file) and a list of address mappings which would later evolve into the functions of Internic which would be turned over to the US Department of Commerce when the number of devices connected to the Internet exploded. Feinler and Jon Postel from UCLA would maintain those though, until his death 28 years later and those RFCs include everything from opening terminal connections into machines to file sharing to addressing and now any place where the networking needs to become a standard.  The development of many of those early protocols that made computers useful over a network were also being funded by ARPA. They funded a number of projects to build tools that enabled the sharing of data, like file sharing and some advancements were loosely connected by people just doing things to make them useful and so by 1971 we also had email. But all those protocols needed to flow over a common form of connectivity that was scalable. Leonard Kleinrock, Paul Baran, and Donald Davies were independently investigating packet switching and Roberts brought Kleinrock into the project as he was at UCLA. Bob Kahn entered the picture in 1972. He would team up with Vint Cerf from Stanford who came up with encapsulation and so they would define the protocol that underlies the Internet, TCP/IP. By 1974 Vint Cerf and Bob Kahn wrote RFC 675 where they coined the term internet as shorthand for internetwork. The number of RFCs was exploding as was the number of nodes. The University of California Santa Barbara then the University of Utah to connect Ivan Sutherland's work. The network was national when BBN connected to it in 1970. Now there were 13 IMPs and by 1971, 18, then 29 in 72 and 40 in 73. Once the need arose, Kleinrock would go on to work with Farouk Kamoun to develop the hierarchical routing theories in the late 70s. By 1976, ARPA became DARPA. The network grew to 213 hosts in 1981 and by 1982, TCP/IP became the standard for the US DOD and in 1983, ARPANET moved fully over to TCP/IP. And so TCP/IP, or Transport Control Protocol/Internet Protocol is the most dominant networking protocol on the planet. It was written to help improve performance on the ARPAnet with the ingenious idea to encapsulate traffic. But in the 80s, it was just for researchers still. That is, until NSFNet was launched by the National Science Foundation in 1986.  And it was international, with the University College of London connecting in 1971, which would go on to inspire a British research network called JANET that built their own set of protocols called the Colored Book protocols. And the Norwegian Seismic Array connected over satellite in 1973. So networks were forming all over the place, often just time sharing networks where people dialed into a single computer. Another networking project going on at the time that was also getting funding from ARPA as well as the Air Force was PLATO. Out of the University of Illinois, was meant for teaching and began on a mainframe in 1960. But by the time ARPAnet was growing PLATO was on version IV and running on a CDC Cyber. The time sharing system hosted a number of courses, as they referred to programs. These included actual courseware, games, convent with audio and video, message boards, instant messaging, custom touch screen plasma displays, and the ability to dial into the system over lines, making the system another early network. In fact, there were multiple CDC Cybers that could communicate with one another. And many on ARPAnet also used PLATO, cross pollinating non-defense backed academia with a number of academic institutions.  The defense backing couldn't last forever. The Mansfield Amendment in 1973 banned general research by defense agencies. This meant that ARPA funding started to dry up and the scientists working on those projects needed a new place to fund their playtime. Bob Taylor split to go work at Xerox, where he was able to pick the best of the scientists he'd helped fund at ARPA. He helped bring in people from Stanford Research Institute, where they had been working on the oNLineSystem, or NLS and people like Bob Metcalfe who brought us Ethernet and better collusion detection. Metcalfe would go on to found 3Com a great switch and network interface company during the rise of the Internet. But there were plenty of people who could see the productivity gains from ARPAnet and didn't want it to disappear. And the National Science Foundation (NSF) was flush with cash. And the ARPA crew was increasingly aware of non-defense oriented use of the system. So the NSF started up a little project called CSNET in 1981 so the growing number of supercomputers could be shared between all the research universities. It was free for universities that could get connected and from 1985 to 1993 NSFNET, surged from 2,000 users to 2,000,000 users. Paul Mockapetris made the Internet easier than when it was an academic-only network by developing the Domain Name System, or DNS, in 1983. That's how we can call up remote computers by names rather than IP addresses. And of course DNS was yet another of the protocols in Postel at UCLAs list of protocol standards, which by 1986 after the selection of TCP/IP for NSFnet, would become the standardization body known as the IETF, or Internet Engineering Task Force for short. Maintaining a set of protocols that all vendors needed to work with was one of the best growth hacks ever. No vendor could have kept up with demand with a 1,000x growth in such a small number of years. NSFNet started with six nodes in 1985, connected by LSI-11 Fuzzball routers and quickly outgrew that backbone. They put it out to bid and Merit Network won out in a partnership between MCI, the State of Michigan, and IBM. Merit had begun before the first ARPAnet connections went online as a collaborative effort by Michigan State University, Wayne State University, and the University of Michigan. They'd been connecting their own machines since 1971 and had implemented TCP/IP and bridged to ARPANET. The money was getting bigger, they got $39 million from NSF to build what would emerge as the commercial Internet.  They launched in 1987 with 13 sites over 14 lines. By 1988 they'd gone nationwide going from a 56k backbone to a T1 and then 14 T1s. But the growth was too fast for even that. They re-engineered and by 1990 planned to add T3 lines running in parallel with the T1s for a time. By 1991 there were 16 backbones with traffic and users growing by an astounding 20% per month.  Vint Cerf ended up at MCI where he helped lobby for the privatization of the internet and helped found the Internet Society in 1988. The lobby worked and led to the the Scientific and Advanced-Technology Act in 1992. Before that, use of NSFNET was supposed to be for research and now it could expand to non-research and education uses. This allowed NSF to bring on even more nodes. And so by 1993 it was clear that this was growing beyond what a governmental institution whose charge was science could justify as “research” for any longer.  By 1994, Vent Cerf was designing the architecture and building the teams that would build the commercial internet backbone at MCI. And so NSFNET began the process of unloading the backbone and helped the world develop the commercial Internet by sprinkling a little money and know-how throughout the telecommunications industry, which was about to explode. NSFNET went offline in 1995 but by then there were networks in England, South Korea, Japan, Africa, and CERN was connected to NSFNET over TCP/IP. And Cisco was selling routers that would fuel an explosion internationally. There was a war of standards and yet over time we settled on TCP/IP as THE standard.  And those were just some of the nets. The Internet is really not just NSFNET or ARPANET but a combination of a lot of nets. At the time there were a lot of time sharing computers that people could dial into and following the release of the Altair, there was a rapidly growing personal computer market with modems becoming more and more approachable towards the end of the 1970s. You see, we talked about these larger networks but not hardware.  The first modulator demodulator, or modem, was the Bell 101 dataset, which had been invented all the way back in 1958, loosely based on a previous model developed to manage SAGE computers. But the transfer rate, or baud, had stopped being improved upon at 300 for almost 20 years and not much had changed. That is, until Hayes Hayes Microcomputer Products released a modem designed to run on the Altair 8800 S-100 bus in 1978. Personal computers could talk to one another.  And one of those Altair owners was Ward Christensen met Randy Suess at the Chicago Area Computer Hobbyists' Exchange and the two of them had this weird idea. Have a computer host a bulletin board on one of their computers. People could dial into it and discuss their Altair computers when it snowed too much to meet in person for their club. They started writing a little code and before you know it we had a tool they called Computerized Bulletin Board System software, or CBBS. The software and more importantly, the idea of a BBS spread like wildfire right along with the Atari, TRS-80, Commodores and Apple computers that were igniting the personal computing revolution. The number of nodes grew and as people started playing games, the speed of those modems jumped up with the v.32 standard hitting 9600 baud in 84, and over 25k in the early 90s. By the early 1980s, we got Fidonet, which was a network of Bulletin Board Systems and by the early 90s we had 25,000 BBS's. And other nets had been on the rise. And these were commercial ventures. The largest of those dial-up providers was America Online, or AOL. AOL began in 1985 and like most of the other dial-up providers of the day were there to connect people to a computer they hosted, like a timesharing system, and give access to fun things. Games, news, stocks, movie reviews, chatting with your friends, etc. There was also CompuServe, The Well, PSINet, Netcom, Usenet, Alternate, and many others. Some started to communicate with one another with the rise of the Metropolitan Area Exchanges who got an NSF grant to establish switched ethernet exchanges and the Commercial Internet Exchange in 1991, established by PSINet, UUNet, and CERFnet out of California.  Those slowly moved over to the Internet and even AOL got connected to the Internet in 1989 and thus the dial-up providers went from effectively being timesharing systems to Internet Service Providers as more and more people expanded their horizons away from the walled garden of the time sharing world and towards the Internet. The number of BBS systems started to wind down. All these IP addresses couldn't be managed easily and so IANA evolved out of being managed by contracts from research universities to DARPA and then to IANA as a part of ICANN and eventually the development of Regional Internet Registries so AFRINIC could serve Africa, ARIN could serve Antarctica, Canada, the Caribbean, and the US, APNIC could serve South, East, and Southeast Asia as well as Oceania LACNIC could serve Latin America and RIPE NCC could serve Europe, Central Asia, and West Asia. By the 90s the Cold War was winding down (temporarily at least) so they even added Russia to RIPE NCC. And so using tools like WinSOCK any old person could get on the Internet by dialing up. Modems for dial-ups transitioned to DSL and cable modems. We got the emergence of fiber with regional centers and even national FiOS connections. And because of all the hard work of all of these people and the money dumped into it by the various governments and research agencies, life is pretty darn good.  When we think of the Internet today we think of this interconnected web of endpoints and content that is all available. Much of that was made possible by the development of the World Wide Web by Tim Berners-Lee in in 1991 at CERN, and Mosaic came out of the National Center for Supercomputing applications, or NCSA at the University of Illinois, quickly becoming the browser everyone wanted to use until Mark Andreeson left to form Netscape. Netscape's IPO is probably one of the most pivotal moments where investors from around the world realized that all of this research and tech was built on standards and while there were some patents, the standards were freely useable by anyone.  Those standards let to an explosion of companies like Yahoo! from a couple of Stanford grad students and Amazon, started by a young hedge fund Vice President named Jeff Bezos who noticed all the money pouring into these companies and went off to do his own thing in 1994. The companies that arose to create and commercialize content and ideas to bring every industry online was ferocious.  And there were the researchers still writing the standards and even commercial interests helping with that. And there were open source contributors who helped make some of those standards easier to implement by regular old humans. And tools for those who build tools. And from there the Internet became what we think of today. Quicker and quicker connections and more and more productivity gains, a better quality of life, better telemetry into all aspects of our lives and with the miniaturization of devices to support wearables that even extends to our bodies. Yet still sitting on the same fundamental building blocks as before. The IANA functions to manage IP addressing has moved to the private sector as have many an onramp to the Internet. Especially as internet access has become more ubiquitous and we are entering into the era of 5g connectivity.  And it continues to evolve as we pivot due to new needs and threats a globally connected world represent. IPv6, various secure DNS options, options for spam and phishing, and dealing with the equality gaps  surfaced by our new online world. We have disinformation so sometimes we might wonder what's real and what isn't. After all, any old person can create a web site that looks legit and put whatever they want on it. Who's to say what reality is other than what we want it to be. This was pretty much what Morpheus was offering with his choices of pills in the Matrix. But underneath it all, there's history. And it's a history as complicated as unraveling the meaning of an increasingly digital world. And it is wonderful and frightening and lovely and dangerous and true and false and destroying the world and saving the world all at the same time.  This episode is pretty simplistic and many of the aspects we cover have entire episodes of the podcast dedicated to them. From the history of Amazon to Bob Taylor to AOL to the IETF to DNS and even Network Time Protocol. It's a story that leaves people out necessarily; otherwise scope creep would go all the way back to to include Volta and the constant electrical current humanity received with the battery. But hey, we also have an episode on that! And many an advance has plenty of books and scholarly works dedicated to it - all the way back to the first known computer (in the form of clockwork), the Antikythera Device out of Ancient Greece. Heck even Louis Gerschner deserves a mention for selling IBM's stake in all this to focus on things that kept the company going, not moonshots.  But I'd like to dedicate this episode to everyone not mentioned due to trying to tell a story of emergent networks. Just because they were growing fast and our modern infrastructure was becoming more and more deterministic doesn't mean that whether it was writing a text editor or helping fund or pushing paper or writing specs or selling network services or getting zapped while trying to figure out how to move current that there aren't so, so, so many people that are a part of this story. Each with their own story to be told. As we round the corner into the third season of the podcast we'll start having more guests. If you have a story and would like to join us use the email button on thehistoryofcomputing.net to drop us a line. We'd love to chat!

KuppingerCole Analysts Videos
Analyst Chat #79: DNS and Privacy

KuppingerCole Analysts Videos

Play Episode Listen Later Jun 7, 2021


Your DNS server knows what websites you use, what the name of your mail server is, and which corporate services you use while working from your home office. And there are even broader challenges when it comes to protecting sensitive personal data in that context. Alexei Balaganski and Matthias continue their conversation about a fundamental Internet resource, the Domain Name System, this time walking the fine line between technology and trust.

KuppingerCole Analysts
Analyst Chat #79: DNS and Privacy

KuppingerCole Analysts

Play Episode Listen Later Jun 7, 2021


Your DNS server knows what websites you use, what the name of your mail server is, and which corporate services you use while working from your home office. And there are even broader challenges when it comes to protecting sensitive personal data in that context. Alexei Balaganski and Matthias continue their conversation about a fundamental Internet resource, the Domain Name System, this time walking the fine line between technology and trust.

Web Masters
Paul Mockapetris @ DNS: The Computer Scientist Who Created the Internet's Phone Book

Web Masters

Play Episode Listen Later Jun 7, 2021 37:04


The Domain Name System -- DNS -- is like the Internet's phone book. It's how computers match URLs to IP addresses in order to help you do things like look at web pages or send emails.Sure, the system seems like an obvious way of structuring the Internet now. After all, can you imagine the Web without Google.com and Amazon.com and Facebook.com? But the current structure of Internet domain names wasn't always an obvious solution to the problem.In this episode of Web Masters, you'll hear how the Domain Name System came into being from the man who invented DNS, Paul Mockapetris. Paul's vision for Internet routing was critical for making the Internet infinitely scalable. But, when he proposed it, he wasn't actually in a position to implement his vision. So, before his system could be adopted, he had to make sure nobody else's proposals were ever considered. Luckily, he was given a perfect opportunity to intervene.For a complete transcript of the episode, click here.

KuppingerCole Analysts Videos
Analyst Chat #78: DNS and DNS Security

KuppingerCole Analysts Videos

Play Episode Listen Later May 31, 2021 24:29


Some internet services are so deeply woven into the core infrastructure, that they are just taken for granted or even ignored in our daily digital life. One example is the Domain Name System. Alexei and Matthias discuss the basics of DNS, look at current cybersecurity threats targeted at it, and explain how they can be mitigated.

KuppingerCole Analysts
Analyst Chat #78: DNS and DNS Security

KuppingerCole Analysts

Play Episode Listen Later May 31, 2021 24:29


Some internet services are so deeply woven into the core infrastructure, that they are just taken for granted or even ignored in our daily digital life. One example is the Domain Name System. Alexei and Matthias discuss the basics of DNS, look at current cybersecurity threats targeted at it, and explain how they can be mitigated.

Security Now (MP3)
SN 818: News From the Darkside - Exim Email Server, Tor's Exit Nodes, TsuNAME, Project Hail Mary

Security Now (MP3)

Play Episode Listen Later May 12, 2021 114:34


Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT Bandwidth.com/SecurityNow Bitwarden.com/twit

Security Now (Video HD)
SN 818: News From the Darkside - Exim Email Server, Tor's Exit Nodes, TsuNAME, Project Hail Mary

Security Now (Video HD)

Play Episode Listen Later May 12, 2021 115:06


Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT Bandwidth.com/SecurityNow Bitwarden.com/twit

Security Now (Video HI)
SN 818: News From the Darkside - Exim Email Server, Tor's Exit Nodes, TsuNAME, Project Hail Mary

Security Now (Video HI)

Play Episode Listen Later May 12, 2021 115:06


Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT Bandwidth.com/SecurityNow Bitwarden.com/twit

Security Now (Video LO)
SN 818: News From the Darkside - Exim Email Server, Tor's Exit Nodes, TsuNAME, Project Hail Mary

Security Now (Video LO)

Play Episode Listen Later May 12, 2021 115:06


Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT Bandwidth.com/SecurityNow Bitwarden.com/twit

All TWiT.tv Shows (Video HD)
Security Now 818: News From the Darkside

All TWiT.tv Shows (Video HD)

Play Episode Listen Later May 11, 2021 115:06


Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT Bandwidth.com/SecurityNow Bitwarden.com/twit

Radio Leo (Video LO)
Security Now 818: News From the Darkside

Radio Leo (Video LO)

Play Episode Listen Later May 11, 2021 115:06


Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT Bandwidth.com/SecurityNow Bitwarden.com/twit

All TWiT.tv Shows (Video HI)
Security Now 818: News From the Darkside

All TWiT.tv Shows (Video HI)

Play Episode Listen Later May 11, 2021 115:06


Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT Bandwidth.com/SecurityNow Bitwarden.com/twit

All TWiT.tv Shows (Video LO)
Security Now 818: News From the Darkside

All TWiT.tv Shows (Video LO)

Play Episode Listen Later May 11, 2021 115:06


Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT Bandwidth.com/SecurityNow Bitwarden.com/twit

Radio Leo (Video HD)
Security Now 818: News From the Darkside

Radio Leo (Video HD)

Play Episode Listen Later May 11, 2021 115:06


Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT Bandwidth.com/SecurityNow Bitwarden.com/twit

Radio Leo (Video HI)
Security Now 818: News From the Darkside

Radio Leo (Video HI)

Play Episode Listen Later May 11, 2021 115:06


Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT Bandwidth.com/SecurityNow Bitwarden.com/twit

All TWiT.tv Shows (MP3)
Security Now 818: News From the Darkside

All TWiT.tv Shows (MP3)

Play Episode Listen Later May 11, 2021 114:34


Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT Bandwidth.com/SecurityNow Bitwarden.com/twit

Radio Leo (Audio)
Security Now 818: News From the Darkside

Radio Leo (Audio)

Play Episode Listen Later May 11, 2021 114:34


Picture of the week. TsuNAME - "DNS Configuration Flaw Lets Attackers Take Down DNS Servers" Huh Google? Tor's Exit Nodes. 21 Nails in Exim's coffin. Project Hail Mary: A Novel. Closing the loop. SpinRite update. News from the Darkside. We invite you to read our show notes at https://www.grc.com/sn/SN-818-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now! at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT Bandwidth.com/SecurityNow Bitwarden.com/twit

Podcast Libre à vous !
#103 - Technopolice - les DNS (« système de noms de domaine ») - « Moi, j'aime la technopolice »

Podcast Libre à vous !

Play Episode Listen Later Apr 27, 2021 82:35


Les podcasts de l'émission sont disponibles.Au programme de la 103e émission : sujet principal sur la campagne Technopolice de La Quadrature du Net ; chronique « A cœur vaillant, la voie est libre » de Laurent Costy – vice-président de l'April – et sa fille Lorette : épisode 2, les DNS (Domain Name System, qu'on peut traduire en « système de noms de domaine » ; chronique « La pituite de Luk » au sujet de la technopolice ; quoi de Libre ? Actualités et annonces concernant l'April et le monde du Libre. Pour retrouver toutes les informations concernant l'émission, rendez-vous sur la page dédiée.Sur cette page, vous pouvez commenter les émissions, nous faire des retours pour nous améliorer, ou encore des suggestions. Et même mettre une note sur 5 étoiles si vous le souhaitez. Il est important pour nous d'avoir vos retours car, contrairement par exemple à une conférence, nous n'avons pas un public en face de nous qui peut réagir.Pour connaître les nouvelles concernant l'émission (annonce des podcasts, des émissions à venir, ainsi que des bonus et des annonces en avant-première) inscrivez-vous à la lettre d'actus.

Podcast Libre à vous !
Chronique de Laurent et Lorette Costy sur les DNS (« système de noms de domaine »)

Podcast Libre à vous !

Play Episode Listen Later Apr 27, 2021 8:34


Les références : Page Wikipédia sur le DNS Le Blog de Genma regroupant les articles sur les DNS Le blog de Stéphane Bortzmeyer dans lequel on trouve de nombreux articles expliquant les DNSVous pouvez commenter les émissions, nous faire des retours pour nous améliorer, ou encore des suggestions. Et même mettre une note sur 5 étoiles si vous le souhaitez. Il est important pour nous d'avoir vos retours car, contrairement par exemple à une conférence, nous n'avons pas un public en face de nous qui peut réagir. Pour cela, rendez-vous sur la page dédiée.

Podcast Libre à vous !
#103 – Technopolice – DNS – La pituite de Luk – « Libre à vous ! » diffusée mardi 27 avril 2021 sur radio Cause Commune

Podcast Libre à vous !

Play Episode Listen Later Apr 27, 2021


Au programme de l'émission : Technopolice, les DNS et la « Pituite de Luk » Émission Références Transcription Contact Libre à vous !, l'émission pour comprendre et agir avec l'April, chaque mardi de 15 h 30 à 17 h sur la radio Cause Commune (93.1 FM en Île-de-France et sur Internet). Au programme de la 103e émission : sujet principal sur la campagne Technopolice de La Quadrature du Net ; chronique « A cœur vaillant, la voie est libre » de Laurent Costy – vice-président de l'April – et sa fille Lorette : épisode 2, les DNS (Domain Name System, qu'on peut traduire en « système de noms de domaine » ; chronique « La pituite de Luk » au sujet de la technopolice ; quoi de Libre ? Actualités et annonces concernant l'April et le monde du Libre. Réécouter en ligne Votre navigateur ne supporte pas l'élément audio : écoutez l'émission (format OGG) ou format MP3. podcast OGG et podcast MP3 S'abonner au podcast S'abonner à la lettre d'actus Podcasts des différents sujets abordés Chronique de Laurent et Lorette Costy sur les DNS (« système de noms de domaine ») (format OGG) (et format MP3) (8 minutes 34 secondes) La campagne Technopolice de La Quadrature du Net (format OGG) (et format MP3) (54 minutes 20 secondes) Chronique de Luk « Moi, j'aime la technopolice » (format OGG) (et format MP3) (3 minutes 44 secondes) Quoi de Libre ? Actualités et annonces concernant l'April et le monde du libre (format OGG) (et format MP3) (6 minutes 41 secondes) N'hésitez pas à nous faire des retours sur le contenu de nos émissions pour indiquer ce qui vous a plu mais aussi les points d'amélioration. Vous pouvez nous contacter par courriel, sur le webchat dédié à l'émission (mais nous n'y sommes pas forcément tout le temps) ou encore sur notre salon IRC (accès par webchat). Vous pouvez nous laisser un message sur le répondeur de la radio en appelant le 09 72 51 55 46 toc_collapse=0; Sommaire  Personnes participantes Galerie photos Références pour la chronique de Laurent et Lorette Costy Références pour la partie sur la campagne Technopolice Références pour la chronique de Luk Références pour la partie « Quoi de Libre ? » Pauses musicales Licences de diffusion, réutilisation Personnes participantes Étienne Gonnu, chargé de mission affaires publiques pour l'April Laurent Costy, administrateur de l'April Lorette Costy Eda Nano, administratrice de l'April et membre de La Quadrature du Net Martin Drago, juriste chez La Quadrature du Net Alouette, animatrice de la campagne Technopolice chez La Quadrature du Net Pablo de l'Union communiste libertaire, en off Luk En régie : Patrick Creusot, bénévole à l'April Traitement du podcast podcast traité par Samuel Aubert podcast découpé en podcasts individuels par Quentin Gibeaux Galerie photos Vous pouvez voir quelques photos prises pendant l'émission. Références pour la chronique de Laurent et Lorette Costy Page Wikipédia sur le DNS Le Blog de Genma regroupant les articles sur les DNS Le blog de Stéphane Bortzmeyer dans lequel on trouve de nombreux articles expliquant les DNS L'April remercie au passage Stéphane Bortzmeyer pour sa relecture préalable du dialogue de cette chronique : cela permet d'apporter des explications les plus justes et pédagogiques possible entre les quelques tentatives d'humour :). Références pour la partie sur la campagne Technopolice Page principale de la campagne Technopolice Forum Technopolice Carte des villes françaises de la Technopolice Documents et projets Technopolice Carte mondiale des caméras de surveillance cartographiées sur OpenStreetMapTexte Technopolice Belgique Page principale de la campagne Technopolice Page de promotion du logiciel de Smart City par l'entreprise XXII Soutenir La Quadrature du Net et la campagne Technopolice Émission Libre à vous ! du 13 avril avec Madada.fr, site associatif qui vous aide à faire des demandes d’accès aux documents administratifs communicables. le site de l'UCL (Union communiste libertaire) et son mensuel Alternative libertaire Campagne de l'UCL « Contre le capitalisme de surveillance et la technopolice : le logiciel libre » Références pour la chronique de Luk L’auto-traque du policier britannique L’inefficacité de la vidéo surveillance Nice protégé du terrorisme par la vidéo protection selon Estrosi Le niveau des recrues de la police en chute libre Le niveau des élèves en baisse Accusation sur Michel Foucault Toutes les chroniques de Luk Références pour la partie « Quoi de Libre ? » Annonce du décès de Daniel Kaminsky T-shirt « Le logiciel libre donne de la voix » Consulter l'Agenda du Libre pour les autres événements en lien avec le logiciel libre Pauses musicales Les références pour les pauses musicales et autres séquences sonores (virgules…) : Notre pad pour proposer des musiques diffusées sous une licence libre 1, 2, 3, petits pois! par Ciboulette Cie (Creative Commons BY 3.0 , 3mn09) Late as usual de l’album Tales of a Dead Fish par The Freak Fandango Orchestra (CC BY-SA 3.0),les paroles Arcane par CloudKicker (Creative Commons BY 3.0 , 3mn25) Wesh Tone par Realaze (Licence Art Libre 1.3, 4 minutes 36, générique et virgule de transition) Sometimes par Jahzaar (Creative Commons CC-BY SA 3.0, 10 secondes utilisées comme virgule de transition avant la partie « Quoi de Libre ? ») Waiting room par Jahzaar (Creative Commons CC-BY SA 3.0, utilisée en cas de problème technique pour faire patienter) Dolling par CyberSDF (Creative Common CC BY 3.0, 2 minutes 40, utilisée sur certains jingles) Licences de diffusion, réutilisation Les podcasts sont diffusés selon les termes d’au moins une des licences suivantes : licence Art libre version 1.3 ou ultérieure, licence Creative Commons By Sa version 2.0 ou ultérieure et licence GNU FDL version 1.3 ou ultérieure. Les musiques sont diffusées sous leur propre licence. $( document ).ready(function() { var hash = document.location.hash; if (hash) { var tab = $(hash).parent('.tabcontent').attr('data-fromtab'); document.getElementById(tab).click() } });

Cyber Security Matters, hosted by Dominic Vogel and Christian Redshaw
Ep. 071: Cyber Security is Risk Management (w/ Andrew Wertkin, BlueCat)

Cyber Security Matters, hosted by Dominic Vogel and Christian Redshaw

Play Episode Listen Later Feb 23, 2021 25:27


Andrew Wertikin, Chief Strategy Officer at BlueCat, is today's guest on the Cyber Security Matters podcast, hosted by Dominic Vogel & Christian Redshaw. For seven years, Andrew has been working for BlueCat, a Domain Name System vendor for larger organizations. With experience in business, technology, IT, and data security, Andrew draws on his unique position of fusing technology and business strategy together to help business leaders understand the importance of all types of risk management.

PC Networking
What is DNS (Domain Name System)?

PC Networking

Play Episode Listen Later Jan 8, 2021 3:29


What is DNS (Domain Name System)? DNS is the system that provides the connection between domain names and IP addresses of internet sites. In short, DNS converts domain names to IP addresses so you can access any website you want without entering complex IP addresses into your internet browser. For example, to enter Google, one of the most visited websites in the world, you need to enter an IP address of 172.217.23.14. However, thanks to the DNS system, typing www.google.com into your internet browser will be sufficient. DNS servers connect the written domain name and IP address and open the Google website. How Does DNS Work? The DNS system works through servers located in many different parts of the world, called DNS servers. This system establishes a connection between the domain name and the IP address within seconds, without you realizing it. The DNS system basically consists of 4 sub-servers. 1. DNS Cursor This sub-server is the first server you encounter in the DNS system. When you type a domain name in your internet browser, the domain name is greeted by the DNS cursor and subjected to a deep query. If the query is successful, further steps are taken. 2. Root Server The domain name passing through the DNS cursor comes to the root server and begins to be resolved there. At this point, simple domain names, which we can see visually, reveal the complex IP addresses they carry. There are different types of DNS resolvers. 3.TLD Server The TLD server, like the root server, is part of the parsing process. In this final resolution step, the domain name is converted to the IP address it represents. Every website is resolved by the .com TLD server at the end of the domain name. 4. Authorized Server The place where everything happens is the authoritative server. The domain name was queried in the DNS cursor and resolved in the root and TLD servers reach the authorized server like the IP address. If the proxy server accesses the record of the IP address, the website opens. If there is no access, additional information is requested by the cursor. DNS Resolvers There are different types of DNS resolvers as we explained in the root server step. These; It is a recursive DNS resolver and authoritative DNS resolver. These two resolvers, which look similar, actually have quite different roles in the DNS system. 1. Recursive DNS Resolver The recursive DNS resolver is the responsive resolver that can be repeatedly requested by the client. What this server does is to search the cache for the answers to the question marks in the resolution process until the domain name reaches the authorized server and reveals the necessary records. 2. Authorized DNS Resolver The authoritative DNS resolver works with the authoritative server and is responsible for keeping all records. It is the last link in the long parsing chain. At the end of the process that resolves the domain name and reaches the IP address it represents, the authorized server opens the website without the need for another query thanks to the authorized DNS resolver. More Podcasts The DHCP in Google Podcast The IP Address in Google Podcast

Intego Mac Podcast
What Do You Want for Christmas?

Intego Mac Podcast

Play Episode Listen Later Dec 10, 2020 35:16


Apple announces new over-the-ear headphones, AirPods Max, and we discuss whether these meet the needs of our hosts. Apple doubles down on anti-tracking rules, and WhatsApps complains about Apple's coming "nutrition labels" about data collection in apps. And Apple and Cloudflare have come up with a new way of sending DNS requests that protects privacy. Show Notes: Apple AirPods Max Apple Could Ban Apps That Don't Follow iOS 14 Anti-Tracking Rules, Says Software Chief Craig Federighi U.S. and States Say Facebook Illegally Crushed Competition WhatsApp Protests Apple's App Store Privacy Requirements After we recorded this episode, Apple announced that they will publish privacy labels for preinstalled iOS apps, which was one of the complaints that WhatsApp had. Apple to Publish Privacy Labels for Preinstalled iOS Apps on Website Unpacking WhatsApp’s privacy label in the Apple App Store Apple and Cloudflare Develop New Privacy-Focused Internet Protocol Domain Name System (Wikipedia) Telephone exchange names (Wikipedia) 867-5309 Intego Mac Premium Bundle X9 is the ultimate protection and utility suite for your Mac. Download a free trial now at intego.com, and use this link for a special discount when you're ready to buy.

Computer Networking
DNS - Computer Networking

Computer Networking

Play Episode Listen Later Jul 1, 2020 4:14


The Domain Name System (DNS) is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most prominently, it translates more readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols. By providing a worldwide, distributed directory service, the Domain Name System has been an essential component of the functionality of the Internet since 1985.

CoinGeek Conversations
“Blockchain can reinvent the internet”: Jeff Chen’s new BSV browser and plan to redesign the domain name system

CoinGeek Conversations

Play Episode Listen Later May 6, 2020 26:33


In 2003, Jeff Chen single-handedly built his own web browser, Maxthon. With its customizable interface, the fast, secure and ad-free web browser drew the attention of investors and Jeff turned it into a profitable business. Today it serves 100 million monthly users in over 140 countries. Now Jeff has discovered the capabilities of Bitcoin SV and is building the latest version of his browser on the BSV blockchain, as well as creating a revolutionary internet domain-name system where all the information will be stored on the chain. Speaking to Charles Miller in this week’s CoinGeek Conversations, Jeff explained what drew him to Bitcoin SV. “With BTC, it’s not possible to do it because it cannot scale. I observed and learned BSV for around 6 months; I understand its technology and the potential. I started thinking about how to integrate the browser with blockchain and to present that in a very user-friendly way.” Jeff hopes to create a global public data storage service which is “transparent and traceable.” In turn, the browser can be a platform for other developers to create more innovative products on blockchain. One of the key advantages Jeff sees in using the blockchain is that money can be fully embedded into online activities. So, how will micro-payments on the new browser work? “We’ll integrate traditional wallets. People don’t have to remember a private key or a public key, all those kinds of scary terms. You use it as normal, as you use Facebook or Twitter using an account and password to log in. And you can top up some money [using fiat currencies or cryptocurrencies] to get points ...to consume all the blockchain features.” Jeff is keen to allow those who aren’t into cryptocurrency to also “get value from blockchain. We want to embrace them”. By providing payment access to BSV applications, such as Twetch, Jeff hopes to make it “very easy for people to enter this blockchain world”. In 2005, after securing its first investment, Maxthon was “the world’s first browser that had cloud service integrated into it.” This enabled bookmarks to be saved to the cloud and to be shared with various systems, which is now commonly available on the world’s biggest browsers. Once Maxthon hit 7 to 8 million users, it piqued the interest of businesses and investors resulting in contracts with Google and Yahoo allowing Jeff to grow his team of developers. That was the story of Maxthon: from personal project to a business with bases in Hong Kong, Beijing and later in San Francisco. Alongside replacing the current mx5 browser (as well as subsequent versions of the software) on blockchain, Jeff is developing a new system for domain names, which he sees as an area ripe for updating. “The domain system was designed in the nineteen eighties. …It’s a very centralised system controlled by thirteen route servers, mostly in the US, with some in Europe.” Jeff points to the inefficiencies in the domain resolving capabilities, using this chain of DNS (domain name system) servers. Regardless of an individual’s internet speed, if there’s any issue with the route server, everyone’s website access slows down. By using blockchain to de-centralise the system, each node would be capable of storing all of the information - effectively redesigning the domain name system on blockchain, making it faster and more secure. “That’s the design of BSV and that’s why we want to create big blocks” says Jeff.Recognizing the scaling power that exists on Bitcoin SV and its ability to resolve the issues with the current internet “I think the vision of Dr. Craig [Wright], that in the future there will be only one chain, I actually believe it. It’s the rule of the internet.” Jeff Chen is a true innovator. Today, the stage is set to use blockchain to improve the internet user experience and the domain name system. Watch this space.

CoinGecko Podcast
Steven McKie on Why We need to Decentralize the Domain Name System - Ep. 9

CoinGecko Podcast

Play Episode Listen Later Apr 7, 2020 42:32 Transcription Available


In this episode, Bobby Ong, co-founder of CoinGecko is joined by Steven McKie, Founding Partner and CEO of Amentum Investment Management. Bobby interviewed Steven on the story behind Handshake, its structure, as well as its plans for Handshake in the next few years.[00:00:02] Intro[00:01:15] What is Handshake?[00:09:00] Handshake’s structure[00:14:20] How is Handshake different from Namecoin?[00:18:24] How does Handshake compare against .crypto and .eth?[00:23:40] How will Handshake TLD work if there is collission?[00:27:45] Handshake’s plans to work with browsers[00:34:00] Stats on domain name auction[00:40:35] Where to follow Handshake?Quotes from the episode:“We're just focused on doing one thing, doing it really well and making it scaleable enough to handle that use case and to be able to just out of the gate have something for people to actually use that could be integrated in a multiple different aspects and with different purity trade off.” [00:05:15]“So whether it’s Chinese, whether it's in English, whether it's in Spanish, whether it's Russian, no matter the translation, you can register that name on the blockchain, and we will recognize that character as your unique TLD.” [00:25:05]“Handshake has grown pretty quickly. So I say you give it another two or three months, we'll probably see a handful of different ways that you can quickly get up and running with Handshake,” [00:33:20]LinksHandshake - https://handshake.org/CoinGecko - https://www.coingecko.com/Handshake (HNS) on CoinGecko - https://www.coingecko.com/en/coins/handshakeHandshake Explorer - https://hnscan.com/Handshake Exchange - https://www.namebase.io/DNS.live - https://dns.live/HSD Tools - https://hsd.tools/auctionsSocial MediaTwitter - https://twitter.com/hnsTelegram - https://t.me/handshaketalk and https://t.me/handshake_hns

Software Engineering Radio - The Podcast for Professional Software Developers

Bert Hubert, author of the open source PowerDNS nameserver discusses DNS security and all aspects of the Domain Name System with its flaws and history.

Software Engineering Radio - The Podcast for Professional Software Developers

Bert Hubert, author of the open source PowerDNS nameserver discusses DNS security and all aspects of the Domain Name System with its flaws and history. Host Gavin Henry spoke with Hubert about what DNS is, DNS history, DNS attacks, DNS flaws, DNS privacy, DNS Encryption, DNS integrity, how DNS is used against your privacy, how […]

Hashr8 Podcast
#72: Disrupting DNS

Hashr8 Podcast

Play Episode Listen Later Mar 2, 2020 42:16


Tieshun Roquerre, CEO of Namebase, joins us to share his amazing entrepreneurial journey and how it led to the founding of one of crypto's hottest startups. We discuss the current Domain Name System, how it's centralized nature allows for absolute control by certain parties, and how Handshake Protocol and Namebase are disrupting the system for the benefit of people everywhere. Previous episodes: https://hashr8.com/#podcast Follow us on Twitter: https://www.twitter.com/h4shr8 ----------------------------------------- HASHR8 Podcast is presented by HASHR8 OS. HASHR8 OS is a Linux-based operating system designed to help you increase the efficiency of your mining machines and maximize your overall profitability. Now with ASIC and GPU support, HASHR8 OS provides the best experience in crypto mining, allowing you to manage your facility from any mobile device. HASHR8 OS is mining as it should be. Take complete complete control of your mining operations today at https://os.hashr8.com HASHR8 OS Discord: https://discord.gg/McuRgwR Twitter: https://www.twitter.com/hashr8os ----------------------------------------- About our sponsor: Luxor Technology is North America's largest mining pool. With a focus on enterprise solutions and an intense focus on customer experience, they provide a premier mining pool platform for bitcoin and altcoin miners. Visit them today at https://luxor.tech, and follow them on Twitter @LuxorTechTeam. Luxor Discord: https://discord.gg/Cpm6rD

44BITS 팟캐스트 - 클라우드, 개발, 가젯
스탠다드아웃_069.log: S3 인텔리전트 티어링, RDS와 DMS 연동 삽질기, 클라우드프론트 지연 이슈 w/ ecleya

44BITS 팟캐스트 - 클라우드, 개발, 가젯

Play Episode Listen Later Feb 3, 2020 50:30


스탠다드아웃 69번째 로그에서는 S3 인텔리전트 티어링, RDS와 DMS 연동 삽질기, 클라우드프론트 지연 이슈 등에 대해 이야기를 나눴습니다. 게스트: @ecleya 참가자: @nacyo_t, @raccoonyy, @seapy 정기 후원 - stdout.fm are creating 프로그래머들의 팟캐스트 | Patreon 주제별 바로 듣기 00:00:00 69번째 에피소드 시작 00:03:08 단신 00:04:50 아마존 S3 인텔리전트 티어링 적용 00:28:48 RDS와 DMS 연동하면서 Auto Vacuum이 멈춰버린 문제 00:39:34 클라우드프론트 특정 통신망 지연 이슈 시작하며 스탠다드아웃_067.log: RDS 인증서 업데이트, 파이썬 2.7 지원 종료, 스톡옵션 등 | 개발자 팟캐스트 stdout.fm 정년 60세 더 늘려봐야 실제 은퇴나이는 ‘49.1세’ 단신 Amazon RDS 스냅샷, Parquet 포맷 기반 Amazon S3 내보내기 기능 출시 | Amazon Web Services 한국 블로그 아마존 S3 인텔리전트 티어링 적용 Object Storage Classes – Amazon S3 객체 수명 주기 관리 - Amazon Simple Storage Service 서버 백업 솔루션 | 백업 솔루션 | Amazon Web Services Amazon S3 Glacier의 볼트 알림 구성 - Amazon S3 Glacier AWS Lambda@Edge에서 실시간 이미지 리사이즈 & WebP 형식으로 변환 - 당근마켓 팀블로그 - Medium New Amazon S3 Storage Class – Glacier Deep Archive | AWS News Blog Archival Cloud Storage  |  Google Cloud Cloud Storage: Object Storage  |  Google Cloud Turing machine - Wikipedia 보안, 클라우드 전송, 웹 성능 | 아카마이 테크놀로지스 KR 노래는대한해협을타고(2014) - 제2회 AWSKRUG 세미나 발표자료 생활TECH - 블랙홀 데이터 5페타바이트, 어떻게 처리했을까? - 테크월드 RDS와 DMS 연동하면서 Auto Vacuum이 멈춰버린 문제 AWS Database Migration Service - Amazon Web Services PostgreSQL: Documentation: 10: 30.2. Write-Ahead Logging (WAL) PostgreSQL: Documentation: 10: 51.80. pg_replication_slots PostgreSQL: Documentation: 10: VACUUM PostgreSQL을 원본으로 사용하고 모든 복제 슬롯이 사용 중이기 때문에 실패하는 AWS DMS 작업 문제 해결 클라우드프론트 특정 통신망 지연 이슈 Content Delivery Network (CDN) | Low Latency, High Transfer Speeds, Video Streaming | Amazon CloudFront Facebook AWSKRUG - 김현민: 유저그룹 슬랙 General 채널에서 이야기 됐던 부분일수도 있는데요, 공식 가이드 문서대로 IPv6를 사용하신다면 Route 53에 A레코드와 AAAA레코드 2개를 등록해주먄 됩니다. … IPv6 address#AAAA Record - Wikipedia 44BITS 기술 블로그

David Bombal
#116: What Is DNS Introduction To Domain Name System. SXSW Giveaway!

David Bombal

Play Episode Listen Later Jan 30, 2020 32:22


Fasthosts are giving UK viewers the chance to win tickets, flight, and accommodation to SXSW 2020 by answering my Techie Test question: https://www.fasthosts.co.uk/davidbombal What is DNS (Domain Name System)? How does DNS actually work? This video shows you practical examples of DNS in real time and includes Wireshark captures showing you actual DNS query and answer messages. ====================== Giveaways: ====================== SXSW Trip: https://www.fasthosts.co.uk/davidbombal Wireshark Course: See hidden link in video SDN Course: See hidden link in video Linux Course: See hidden link in video ====================== Menu: ====================== What does DNS do? 00:01 Why do we use DNS? 2:10 Analogy of DNS: 4:00 SXSW: 5:25 Practical DNS: 7:30 Lab: 8:20 Wireshark capture of DNS: 9:50 Edit Windows host file: 15:45 Use a Cisco router as a DNS server: 18:22 nslookup IPv4 / IPv6: 23:09 Rogue DNS example: 24:35 Ubuntu DNS server setup (dnsmasq): 25:47 ====================== CCNA content: ====================== Free CCNA content: https://www.youtube.com/playlist?list=PLhfrWIlLOoKM3niunUBTLjOR4gMt_uR_a CCNA course: http://bit.ly/2PmTVPD ====================== Free or Trial Network Software: ====================== Solar-PuTTY: http://bit.ly/SolarPutty SolarWinds TFTP Server: http://bit.ly/2mbtD6j WAN Killer: http://bit.ly/wankiller Engineers Toolset: http://bit.ly/gns3toolset IP Address Scanner: http://bit.ly/swipscan Network Device Scanner: http://bit.ly/swnetscan Wifi Heat Map: http://bit.ly/wifiheat Wifi Analyzer: http://bit.ly/swwifianalyzer SolarWinds NPM: http://bit.ly/getnpm ====================== Dnsmasq setup: ====================== sudo systemctl disable systemd-resolved sudo systemctl stop systemd-resolved Edit the /etc/resolv.conf file to contain the following entry: nameserver 8.8.8.8 Now install dnsmasq sudo apt install dnsmasq uncomment these lines: port=53 domain-needed bogus-priv no-resolv Add your domains below the no-resolv line: address=/r1.home.com/10.1.1.254 address=/myrouter.home.com/10.1.1.254 Set your public server to Google for example: server=8.8.8.8 DNS DHCP EVE-NG GNS3 VIRL Packet Tracer 10x Engineer CCNA Cisco Devnet Associate CCNP Enterprise CCNP Security CCNP Data Center CCNP Service Provider CCNP Collaboration Cisco Certified Devnet Professional Cisco Certified Network Professional LPIC 1 LPIC 2 Linux Professional Institute LX0-103 LX0-104 XK0-004 Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! ======================== #dns #sxsw #wireshark

Cyber Help
What is DNS (Domain Name System) & Types - IN DETAILS

Cyber Help

Play Episode Listen Later Dec 15, 2019 9:06


In this podcast, you will find the detailed working of DNS Suit. DNS Suit because DNS has different types and how it works, go and check it out.

Met Nerds om Tafel
S06E01 - de wortel van het internet en waarom je manager minder stom is dan je denkt - met Bert Hubert van PowerDNS

Met Nerds om Tafel

Play Episode Listen Later Nov 7, 2019 96:56


Bert Hubert is de man achter PowerDNS, een van de handvol bekende Domain Name System-servers die het internet laten werken zoals jij gewend bent. Wat DNS precies is en hoe mannen met baarden het de wortel van het internet vormen leer je in deze aflevering. Bert zou geen ware nerd zijn als hij niet als hobby had om satellieten te volgen via een zelfgebouwd monitorsysteem, en als ervaringsdeskundige vertelt hij ons waarom nerds de lease-auto van hun manager misschien vaker complimentjes moeten geven.Deze aflevering wordt mogelijk gemaakt door Farhaz ‘Hazzie’ Hofman, en vraag aandacht voor depressie.Tijdschema0:00:00 Advertentie van Farhaz0:01:16 Huishoudelijke mededelingen0:02:16 Introductie Bert Hubert0:02:31 Wat is DNS?0:13:43 Internet slopen met DNS0:15:10 Wat is PowerDNS?0:18:45 Geld verdienen met open source0:21:34 De mensen achter PowerDNS0:27:46 DNS over HTTPS0:36:04 Twitterfittie met Cloudflare0:44:46 PowerDNS for Windows0:47:53 Galmon – monitoring van GPS en Galileo1:00:32 Nerds versus managers1:07:32 Auto’s voor oude mannen1:10:35 Vragen van de luisteraars1:25:34 Tips voor de luisteraars1:35:40 AfkondigingTIPSRandalInterstellar op Pathé ThuisJoostGood Omens - Amazon primeBert HubertStuur nooit een boze e-mailDoe eens salarisonderhandeling

WIRED Security: News, Advice, and More
A Controversial Plan to Encrypt More of the Internet

WIRED Security: News, Advice, and More

Play Episode Listen Later Oct 24, 2019 9:49


The security community generally agrees on the importance of encrypting private data: Add a passcode to your smartphone. Use a secure messaging app like Signal. Adopt HTTPS web encryption. But a new movement to encrypt a fundamental internet mechanism, promoted by browser heavyweights like Google Chrome and Mozilla's Firefox, has sparked a heated controversy. The changes center around the Domain Name System, a decentralized directory that acts essentially as the internet's address book.

Voice of Digital Abhi
What is Website? Web Design Fundamentals | Digital Marketing Podcast

Voice of Digital Abhi

Play Episode Listen Later Aug 21, 2019 8:35


In the episode #02 of "Voice of Digital Abhi" I have tried to explain the basics and fundamentals of websites and blogs. These basics include Domain name, Hosting or Web Server, DNS or Domain Name System, CMS or Content Management System and Creation of a website. I tried to explain these in the best way possible. If you are someone who needs a website but is confused about the terminology and basics related to it, this episode is for you. You will also get to know some other basics related to websites and web development in this episode. Why you should have a website? Link for the video: https://youtu.be/7h4GZ6c1Nkw - Get your Domain name and Hosting from Bluehost: https://www.bluehost.com/track/digitalabhi/ - Let's Connect Socially: - Instagram: https://instagram.com/digitalabhi_ - YouTube: https://youtube.com/channel/UCV5n0Qf9YkE5ot1JICm0SyQ - Twitter: https://twitter.com/digitalabhi__ - LinkedIn: https://www.linkedin.com/in/digitalabhi0/ - Facebook page: https://www.facebook.com/digitalabhi0/ - Facebook group: https://www.facebook.com/groups/722817831173075/ - Quora: https://www.quora.com/profile/Abhishek-Sharma-4495- Connect with me socially so that I can help you out there also with queries related to Digital Marketing. Also, stay tuned to Digital Abhi for content related to Digital Marketing. --- Send in a voice message: https://anchor.fm/digitalabhi/message Support this podcast: https://anchor.fm/digitalabhi/support

The History of Computing
The History Of DNS

The History of Computing

Play Episode Listen Later Jul 31, 2019 8:22


Welcome to the History of Computing Podcast, where we explore the history of information technology. Because by understanding the past, we're able to be prepared for the innovations of the future! Todays episode is on the history of the Domain Name System, or DNS for short.  You know when you go to www.google.com. Imagine if you had to go to 172.217.4.196, or the IP address, instead. DNS is the service that resolves that name to that IP address. Let's start this story back in 1966. The Beatles released Yellow Submarine. The Rolling Stones were all over the radio with Paint It Black. Indira Ghandi was elected the Prime Minister of India. US Planes were bombing Hanoi smack dab in the middle of the Vietnam War. The US and USSR agreed not to fill space with nukes. The Beach Boys had just released Good Vibrations. I certainly feel the good vibrations when I think that quietly, when no one was watching, the US created ARPANET, or the Advanced Research Projects Agency Network.  ARPANET would evolve into the Internet as we know it today. As with many great innovations in technology, it took awhile to catch on. Late into the 1980s there were just over 300 computers on the Internet, most doing research. Sure, there were 254 to the 4th addresses that were just waiting to be used, but the idea of keeping the address of all 300 computers you wanted to talk to seemed cumbersome and it was slow to take hold. To get an address in the 70s you needed to contact Jon Postel at USC to get put on what was called the Assigned Numbers List. You could call or mail them.  Stanford Research Institute (now called SRI) had a file they hosted called hosts.txt. This file mapped the name of one of these hosts on the network to a IP address, making a table of computer names and then IP addresses those matched with, or a table of hosts. Many computers still maintain this file. Elizabeth Feinler maintained this directory of systems. She would go on to lead and operate the Network Information Center, or NIC for short, for ARPANET and see the evolution to the Defense Data Network, or DDN for short and later the Internet. She wrote what was then called the Resource Handbook.  By 1982, Ken Harrenstien and Vic White on Feinler's group at Stanford created a service called Whois, defined in RFC 812, which was an online directory. You can still use the whois command on Windows, Mac and Linux computers today. But by 1982 it was clear that the host table was getter's slower and harder to maintain as more systems were coming online. This meant more people to do that maintenance. But Postel from USC then started reviewing proposals for maintaining this thing, a task he handed off to Paul Mockapetris. That's when Mockapetris did something that he wasn't asked to do and created DNS.  Mockapetris had been working on some ideas for filesystems at the time and jumped at the chance to apply those ideas to something different. So Jon Postel and Zaw-Sing Su helped him complete his thoughts which were published by the Internet Engineering Task Force, or IETF, in in RFC 882 for the concepts and facilities and RFC 883 for the implementation and specification in November 1983. You can google those and read them today. And most of it is still used.  Here, he introduced the concept that a NAME of a TYPE points to an address, or RDATA and lives for a specified amount of time, or TTL short for Time To Live. He also mapped IP addresses to names in the specifications, creating PTR records. All names had a TLD or Top Level Domain name of ARPANET.  Designing a protocol isn't the same thing as implementing a protocol. In 1984, four students from the University of California Berkeley wrote the first version of BIND, short for Berkeley Internet Name Domain, for BSD 4.3. Douglas Terry, Mark Painter, David Riggle, and Songnian Zhou using funds from a DARPA grant. In 1988 Paul Vixie from Digital Equipment Corporation then gave it a little update and maintained it until he founded the Internet Systems Consortium to take it over.  BIND is still the primary distribution of DNS, although there are other distributions now. For example, Microsoft added DNS in 1995 with the release of NT 3.51.  But back to the 80s real quick. In 1985, came the introduction of .mil, .gov, .edu, .org, .com TLDs. Remember John Postel from USC? He and Joyce K Reynolds started an organization called IANA to assign numbers for use on the Internet. DNS Servers are hierarchical, and so there's a set of root DNS servers, with a root zone controlled by the US Dept of Commerce. 10 of the 13 original servers were operated in the US and 3 outside, each assigned a letter of A through M. You can still ping a.root-servers.net. These host the root zone database from IANA and handle the hierarchy of the TLD they're authoritative for with additional servers hosted for .gov, .com, etc. There are now over 1,000 TLDs! And remember how USC was handling the addressing (which became IANA) and Stanford was handling the names? Well Feinler's group turned over naming to Network Solutions in 1991 and they handled it until 1998 when Postel died and ICANN was formed. ICANN or the Internet Corporation for Assigned Names and Numbers, merged the responsibilities under one umbrella. Each region of the world is allowed to manage their own IP addresses, and so ARIN was formed in 1998 to manage the distribution of IP addresses in America.  The collaboration between Feinler and Postel fostered the innovations that would follow. They also didn't try to take everything on. Postel instigated TCP/IP and DNS. Postel co-wrote many of the RFCs that define the Internet and DNS to this day. And Feinler's showed great leadership in administering how much of that was implemented. One can only aspire to find such a collaboration in life and to do so with results like the Internet, worth tens of trillions of dollars, but more importantly has reshaped the world, disrupted practically every industry and touched the lives of nearly every human on earth.  Thank you for joining us for this episode of the History Of Computing Podcast. We hope you had an easy time finding thehistoryofcomputing.libsyn.com thanks to the hard work of all those who came before us. 

Python Podcast
Deployment von Webapplikationen

Python Podcast

Play Episode Listen Later Jul 30, 2019 116:38


In der nunmehr zwölften Episode reden wir über das Deployment von Webapplikationen. Themen waren diesmal:   Soll man einen eigenen Server mieten oder doch lieber eine fertige Plattform zum Hosten benutzen? Wie kommt der Code eigentlich auf die Maschine? Was für Services müssen für eine Webapplikation üblicherweise so laufen?   Shownotes Unsere E-Mail für Fragen, Anregungen & Kommentare: hallo@python-podcast.de News aus der Szene Django for Professionals Data Labeling That You Can Feel Good About - Episode 89 mit Cloudfactory Unterstützungsanfrage für Pretalx auf dem CCCamp2019 Projektmanagement Software: Taiga, Trello, Jira Episode #216: Digging into Visual Studio Code PySimpleGUI EPISODE 021 Django Co-Creator - Simon Willison Deployment von Webapplikationen Domain Name System Comic, der DNS erklärt IaaS vs PaaS vs SaaS Divio Wagtail und Django-CMS Hosting Heroku, Pythonanywhere EC2, Lightsale, Digitalocean, Container bei Hetzner Docker, Docker-Compose, Vagrant Ansible, Chef and Puppet, SaltStack Redis, Varnish Caddy, Whitenoise Gunicorn, uWSGI Celery, Flower ownCloud, Dropbox, Google Drive Let's Encrypt OpenVPN MQTT, GraphQL daphne Öffentliches Tag auf konektom

#heiseshow (Audio)
Sicherheit und Datenschutz – Was passiert mit dem DNS? | #heiseshow

#heiseshow (Audio)

Play Episode Listen Later Apr 10, 2019


Arbeiten am Domain Name System beheben alte Problem und beschwören neue herauf. Was es damit auf sich hat, besprechen wir in einer neuen Folge.

#heiseshow (HD-Video)
Sicherheit und Datenschutz – Was passiert mit dem DNS? | #heiseshow

#heiseshow (HD-Video)

Play Episode Listen Later Apr 10, 2019


Arbeiten am Domain Name System beheben alte Problem und beschwören neue herauf. Was es damit auf sich hat, besprechen wir in einer neuen Folge.

#heiseshow (SD-Video)
Sicherheit und Datenschutz – Was passiert mit dem DNS? | #heiseshow

#heiseshow (SD-Video)

Play Episode Listen Later Apr 10, 2019


Arbeiten am Domain Name System beheben alte Problem und beschwören neue herauf. Was es damit auf sich hat, besprechen wir in einer neuen Folge.

0d - Zeroday
0d037 – Domain Name System (DNS) Teil 1

0d - Zeroday

Play Episode Listen Later Mar 12, 2019 116:44


Nachdem die Helden der Informations- und Datensicherheit es endlich einmal geschafft haben ohne “bla bla” vor dem Intro eine Folge zu beginnen, widmet sich Stefan dem Domain Name System und gibt einen überblick über die Historie dahinter und einen wirklich rudimentären Einblick wie es funktioniert. Kündigt jedoch bereits Vertiefungen an. Zwischendurch lenkt Sven Stefan ab, indem er sein rechtes Ohr lüftet. Disclaimer In diesem Podcast werden Techniken oder Hardware vorgestellt, die geeignet sind, externe Geräte anzugreifen. Dies geschieht ausschließlich zu Bildungszwecken, denn nur, wenn man die Angriffstechniken kennt, kann man sich effektiv davor schützen. Denkt immer daran, diese Techniken oder Hardware nur bei Geräten anzuwenden, deren Eigner oder Nutzer das erlaubt haben.Der unerlaubte Zugriff auf fremde Infrastruktur ist strafbar (In Deutschland §202a, §202b, §202c StGB).

To The Point - Cybersecurity
What will happen in the future? 2019 Government Cybersecurity Predictions - E019

To The Point - Cybersecurity

Play Episode Listen Later Feb 12, 2019 20:40


2019 is already off to an interesting start in terms of government cybersecurity—we’ve had a 35 days government shutdown and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency recently issued its first emergency directive about Domain Name System tampering activities. On this week’s episode Forcepoint’s George Kamis (CTO Global Governments & Critical Infrastructure) joins Eric and Arika for a discussion around the most pressing cybersecurity issues for government in 2019– and what agencies can do to protect against them.  For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e19

Firewalls Don't Stop Dragons Podcast
How to Protect Yourself From Ransomware

Firewalls Don't Stop Dragons Podcast

Play Episode Listen Later Oct 8, 2018


Ransomware, the malware that locks up your data and hold it for ransom, has been growing by leaps and bounds in the past few years, WHY? Because it works. Hackers trick you into installing the malware which encrypts your most precious files and demands that you pay Bitcoin to get the key that unlocks them. It’s like a burglar broke into your house and put all your valuables in a safe in your living room, demanding payment for the combination. Allan Liska explains why ransomware has become a favorite tool of both hackers and nation states, how to protect your computers, and even what you can do if you are unfortunate enough to be infected. Allan Liska is an intelligence analyst at Recorded Future. Allan has more than 15 years’ experience in information security and has worked as both a blue teamer and a red teamer for the intelligence community and the private sector. Allan has helped countless organizations improve their security posture using more effective and integrated intelligence. Allan is also one of the organizers of BSides Bordeaux and has presented at security conferences around the world on a variety of topics. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the co-author of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion. For Further Insight: Ransomwhere (Ransomware protection for Mac): https://objective-see.com/products/ransomwhere.html No More Ransom (if you get infected): https://www.nomoreransom.org/ Website: www.bsidesbdx.org Twitter: https://twitter.com/uuallan LinkedIn: https://www.linkedin.com/in/allan2/

WIRED Security: News, Advice, and More
A New App Gives Old Android Versions an Important Safety Upgrade

WIRED Security: News, Advice, and More

Play Episode Listen Later Oct 3, 2018 6:16


Thanks to a push over the last few years, led by Google and others, encrypted HTTPS connections protect more data than ever as it passes between web servers and browsers. But another fundamental component of web browsing too often remains unencrypted: the Domain Name System connections that act as the address lookups of the internet. In Android 9, also known as Android Pie, Google has added a feature called Private DNS to start encrypting DNS on mobile.

Ham Radio Workbench Podcast
HRWB060-Introduction to Networking and Security

Ham Radio Workbench Podcast

Play Episode Listen Later Sep 25, 2018 164:00


Most of us have several devices connected to the Internet in our Ham Shacks.  A computer, a digital mode hotspot, and a Raspberry Pi are several common items one would find.  We may not give much thought to these devices because affordable commercially available equipment make it a breeze to connect devices to each other and the Internet.  But, have you ever stopped to think whether your hotspot should have network access to the computer you do your taxes on? This week Nick KN6NK and Smitty KR6ZY join us to give an introduction to basic networking topics and a primer on basic but powerful practices to secure our networks in the ham shack and beyond.   Nick KN6NK - https://twitter.com/explodinglemur?lang=en Smitty KR6ZY - https://twitter.com/smittyhalibut Our Website - http://www.hamradioworkbench.com/ Follow us on Twitter - https://twitter.com/hamworkbench Contact us for feedback and ideas - http://hamradioworkbench.com/contact Connect with us on Facebook - https://www.facebook.com/groups/hamradioworkbench/ BrandMeister Talkgroup 31075 - https://hose.brandmeister.network/group/31075/ Save $100 on the Digilent Analog Discovery 2 Package by using code “HamRadioWorkbench2018” in your cart prior to checkout - https://store.digilentinc.com/ham-radio-workbench-bundle/ Save 10% off of a PowerFilm Solar 30 Watt Panel with Anderson Powerpole Adapter with code WORKBENCH 10 at checkout (through Dec 31, 2018) - 30 Watt Foldable Solar Panel with Anderson Powerpole Adapter Closed-loop spindle speed control (Arduino PID controller) for my 3040 router (they’re all over eBay) Watching developments on uBITx harmonics/spurs and related fixes Retro DOS gaming on real hardware instead of DOSBox!  Thin client and sound card Proposed ARES standard headset interface: http://www.sloecc.org/headsets/proposal_ares_standard_headset.pdf EEVBLOG Raspberry PI PoE Hat Issues - https://www.eevblog.com/2018/09/20/eevblog-1122-raspberry-pi-3-poe-hat-fail-investigation/ Raspberry Pi PoE Hat Issues Forum Post - https://www.raspberrypi.org/forums/viewtopic.php?t=220984 Raspberry Pi PoE Hat Issues - The Register article The 7-Layer OSI Model - https://www.webopedia.com/quick_ref/OSI_Layers.asp 802.11 WiFi Standards - https://en.wikipedia.org/wiki/IEEE_802.11 Dynamic Host Configuration Protocol (DHCP) - https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol Network Address Translation (NAT) - https://en.wikipedia.org/wiki/Network_address_translation Stateful vs Stateless Firewalls - https://www.lanner-america.com/blog/stateless-vs-stateful-packet-filtering-firewalls-better/ Virtual Private Network (VPN) - https://en.wikipedia.org/wiki/Virtual_private_network Demilitarized Zone (DMZ) - https://en.wikipedia.org/wiki/DMZ_(computing) Domain Name System - https://en.wikipedia.org/wiki/Domain_Name_System Dynamic Domain Name System (DDNS) - https://en.wikipedia.org/wiki/Dynamic_DNS COTS wifi+router with third-party firmware - Tomato / dd-wrt / OpenWRT Overview of basic commercial wifi+router security - https://lifehacker.com/how-to-make-your-wifi-router-as-secure-as-possible-1827695547 Wired Network sniffing - http://www.halibut.com/~mark/EtherSniff-v1.0.pdf Wifi security talk Virtual Local Area Network (VLAN) - https://en.wikipedia.org/wiki/Virtual_LAN Ubiquiti Unifi Networking Gear - https://unifi-sdn.ubnt.com/

Chaosradio
CR250 Das Domain Name System

Chaosradio

Play Episode Listen Later Sep 24, 2018 118:06


Ohne dass wir je darüber nachdenken, tut es seinen Dienst jedesmal dann, wenn wir Adressen wie fritz.de, chaosradio.ccc.de oder andere Webseiten in unserem Browser aufrufen. Dann nämlich übersetzt DNS, das Domain Name System, zwischen zahlenfaulen Benutzern und dem Internet, in dem es eigentlich nur Zahlen in Form von IP-Adressen gibt. Trotz seiner zentralen Bedeutung hat sich an DNS in der Praxis nicht viel verändert. Und so kommt es, dass DNS nicht so sicher ist, wie es eigentlich sein müsste, oder sogar könnte, auch wenn es viele Vorschläge gibt. Im Chaosradio 250 spricht Marcus Richter mit seinen Gästen aus dem Chaos Computer Club über DNS, seine eher unbekannten Fähigkeiten und mögliche Lösungen für das damit verbundene Verschlüsselungsdilemma.

The Bitcoin Podcast
The Bitcoin Podcast #222: Imran Khan

The Bitcoin Podcast

Play Episode Listen Later Sep 9, 2018 61:39


There is increasing talk of Blockchain as a possible alternative for the current Domain Name System, to counter censure and cache poisoning. But what is blockchain and can it really replace DNS? The Domain Name System has been in operation for decades and is the infrastructure that handles billions of queries over the internet. As a user, you rely on your operating system and browser to help navigate the internet. However, whats humming quietly is the back-end infrastructure that helps your device find the right website. We invite Imran Khan on the show to explain Handshake, ENS and Decentralized Naming Services.

Mises Brasil
Podcast 325 – Tecnologia, ameaças e oportunidades à liberdade

Mises Brasil

Play Episode Listen Later Jul 16, 2018


Com uma rica trajetória acadêmica e empreendedora na área de tecnologia, o professor Ivan Moura Campos é Ph.D. em Ciência da Computação pela Universidade da Califórnia, foi professor titular de Ciência da Computação da UFMG, atuou como coordenador do Comitê Gestor da Internet no Brasil e como diretor da Internet Corporation for Assigned Names and Numbers (ICANN), entidade que coordena o Domain Name System da Internet em escala mundial. Atualmente, o professor Ivan tem se dedicado ao trabalho na Hekima, startup de Inteligência Artificial e Big Data Analytics. Nesta entrevista ao Podcast do Instituto Mises Brasil, ele falou sobre segurança de dados e a privacidade na internet, apontou os problemas hoje existentes nas redes sociais, explicou quais são as maiores ameaças às liberdades individuais provocadas pelo uso da tecnologia e como se proteger, e apontou como a tecnologia pode ajudar a aumentar o grau de liberdades no mundo, não só nos países livres, mas naqueles países com alto grau de intervenção do governo. *** A música da vinheta de abertura é “Gotham” executada pelo guitarrista Eric Calderone. *** Todos os Podcasts podem ser baixados e ouvidos pelo site, pela iTunes Store e pelo YouTube. E se você gostou deste e/ou dos podcasts anteriores, visite o nosso espaço na iTunes Store, faça a avaliação e deixe um comentário.

Intego Mac Podcast
What's Up with My iPhone's Battery?

Intego Mac Podcast

Play Episode Listen Later Jan 17, 2018 33:51


We discuss and explain the issue around iPhone batteries, and tell you what to do if your iPhone's battery isn't lasting all day. We also look at a new, dumb password bug in macOS High Sierra, new Wi-Fi security standards, and new Mac malware. Yet another macOS High Sierra bug: Unlock App Store system preferences with any password (https://www.macworld.com/article/3246634/macs/macos-high-sierra-bug-unlock-app-store-system-preferences.html) Is Apple Even Paying Attention To macOS Security Anymore? (https://www.howtogeek.com/339063/is-apple-even-paying-attention-to-macos-security-anymore/) Wi-Fi Alliance announces new WPA3 security protections (https://www.theverge.com/2018/1/9/16867940/wi-fi-alliance-new-wpa3-security-protections-wpa2-announced) ¡Ay, MaMi! New DNS-Hijacking Mac Malware Discovered Domain Name System (Wikipedia) (https://en.wikipedia.org/wiki/Domain_Name_System) Intego New Mac User Center A Message to Our Customers about iPhone Batteries and Performance (Apple) (https://www.apple.com/iphone-battery-and-performance/) When iPhone Batteries Go Bad Why Apple Is Replacing the Battery on my iPhone SE iPhone Battery & Power Repair (https://support.apple.com/iphone/repair/battery-power) Apple Now Faces 26+ Lawsuits for 'Purposefully' or 'Secretly' Slowing Down Older iPhones (https://www.macrumors.com/2018/01/05/apple-faces-23-lawsuits-for-iphone-slowdowns/) Get 50% off Intego's Mac Premium Bundle X9 with the code PODCAST19. Download now and try it for free at intego.com.

Software Engineering Institute (SEI) Podcast Series
DNS Blocking to Disrupt Malware

Software Engineering Institute (SEI) Podcast Series

Play Episode Listen Later Oct 12, 2017 15:05


For some time now, the cyber world has been under attack by a diffused set of enemies who improvise their own tools in many different varieties and hide them where they can do much damage. In this podcast, CERT researcher Vijay Sarvepalli explores Domain Name System or DNS Blocking, the idea of disrupting communications from malicious code such as ransomware that is used to lock up your digital assets, or data-exfiltration software that is used to steal your digital data. DNS blocking ensures a wide impact while avoiding the complexity of having to install or instrument every device in your enterprise. The key takeaway is to target a break in the chain of malware to minimize its effectiveness and the malicious code developer’s intended success. Listen on Apple Podcasts.

Nice Games Club
"Ugly and hard to use." Your Game's Website; Game Exhibits and Installations; Losing

Nice Games Club

Play Episode Listen Later Jul 31, 2017


This week, Martha stops short of detailing the DNS protocol, Mark describes a completely different Star Trek VR thing which he made for the Minnesota Orchestra Hall, and Stephen explains how to lose like a real champ.Plus, like the classic 1985 film Clue, this episode has multiple endings!Discuss this episode on Reddit using this thread in r/gamedev!Stephen's headphone audio testing suiteWhite Land -  F-Zero Arranged, YouTubeThe Sea - Magic Pengel, YouTubeDo It  - Tuxedo, YouTubeStephen updated the feedback form! Let us have it! Your Game's Website 0:08:13 Martha MegarryMarketingStand Still, Stay Silent, a webcomicCity of Hunger development blogMidwest Game Developers Facebook grouppresskitDomain Name System - WikipediaThe Difference Between Shared Hosting, VPS, and Dedicated Hosting - 99robotsHTML5 Up (free, simple site templates)EverendOoblets Game Exhibits and Installations 0:36:31 Mark LaCroixPhysical GamesMark's “Holodeck” VR installation at Minnesota Orchestra Hall Installation, Gameplay, Photo, Animation, Props, People, More people!An Ode to the Okudagram - Will Nguyen, TreknewsVR Snowball ShootersA Maze BerlinVR Pigeons at A Maze Berlin 2017 - spunior, YouTubePeter Molydeux, a parody Twitter account - TwitterThe world of weird video games at Alt.Ctrl.GDC - Jessica Conditt, EngadgetHands-on with Line Wobbler: a 16 foot tall, one-dimensional dungeon crawler - Nick Robinson, Polygon Losing 1:06:40 Stephen McGregorIRLDota 2 Tournament Holds Rage-Quit Competition For Fans - Eric Van Allen, KotakuBayonetta Pro Upsets Smash's Best To Win Evo Championship - Eric Van Allen, KotakuVVVVVV No Death Mode - microdicePeercast, YouTubeSuper Mario Odyssey Won't Have Game Over Screens - Hope Corrigan, IGN

Nice Games Club
"Ugly and hard to use." Your Game’s Website; Game Exhibits and Installations; Losing

Nice Games Club

Play Episode Listen Later Jul 31, 2017


This week, Martha stops short of detailing the DNS protocol, Mark describes a completely different Star Trek VR thing which he made for the Minnesota Orchestra Hall, and Stephen explains how to lose like a real champ. Plus, like the classic 1985 film Clue, this episode has multiple endings! Discuss this episode on Reddit using this thread in r/gamedev! Stephen's headphone audio testing suite "White Land" - F-Zero Arranged "The Sea" - Magic Pengel “Do It” - Tuxedo Stephen updated the feedback form! Let us have it! Your Game’s Website 0:08:13 Martha Megarry Category Marketing Stand Still, Stay Silent, a webcomic City of Hunger development blog Midwest Game Developers Facebook group presskit() Domain Name System, - Wikipedia “The Difference Between Shared Hosting, VPS, and Dedicated Hosting” - 99robots HTML5 Up (free, simple site templates) Everend Ooblets Game Exhibits and Installations 0:36:31 Mark LaCroix Category Physical Games Mark’s “Holodeck” VR installation at Minnesota Orchestra Hall Installation, Gameplay, Photo, Animation, Props, People, More people! “An Ode to the Okudagram” - - Will Nguyen , Treknews “VR Snowball Shooters” A Maze Berlin “VR Pidgeons at A Maze Berlin 2017” - spunior , YouTube Peter Molydeux, a parody Twitter account - Twitter “The world of weird video games at Alt.Ctrl.GDC” - Jessica Conditt , Engadget “Hands-on with Line Wobbler: a 16 foot tall, one-dimensional dungeon crawler” - Nick Robinson , Polygon Losing 1:06:40 Stephen McGregor Category IRL “Dota 2 Tournament Holds Rage-Quit Competition For Fans” - Eric Van Allen , Kotaku “Bayonetta Pro Upsets Smash's Best To Win Evo Championship” - Eric Van Allen , Kotaku “VVVVVV No Death Mode” - microdicePeercast , YouTube https://www.youtube.com/watch?v=sG54P89-qcU - Hope Corrigan , IGN

State of Identity
LIGHTest: the Future of Trust

State of Identity

Play Episode Listen Later Jul 24, 2017 31:30


Host Cameron D’Ambrosi joins an international panel of experts to discuss LIGHTest: a global, cross-domain trust infrastructure built by combining existing Domain Name System framework with new innovative building blocks.

Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies
Alex Van de Sande & Nick Johnson: ENS – A Global Naming System for Ethereum

Epicenter - Learn about Blockchain, Ethereum, Bitcoin and Distributed Technologies

Play Episode Listen Later May 16, 2017 73:23


Naming systems are an important component of any networked information system. It’s difficult to imagine how the Internet could have been adopted by the masses had it not been for the Domain Name System, which translates machine-readable IP addresses into human-readable domain names. Blockchains, with their long and complex address formats, suffer from a similar problem. One might think a solution would be to apply the same naming system architecture we have for the public Internet to public blockchains. But DNS, in the eyes of many, is a largely flawed system. Centrally controlled by the Internet Corporation for Assigned Names and Numbers (ICANN), Internet domain names are vulnerable to censorship and barriers to entry are kept artificially high – registering a new Top Level Domain (ex: .epicenter) costs hundreds of thousands of dollars. We’re joined by Alex Van de Sande and Nick Johnson to discuss their approach to creating an open, secure and decentralized naming system for the Ethereum Network. The Ethereum Naming System (ENS) allows users to register .eth domain names, which can be used in supporting Ethereum wallets and clients. Names are reserved by placing a deposit in a smart contract and can be mapped to any Ethereum addresses. So rather than sending funds to 0x8cd…0935, one would simply need to type a memorable name like epicenter.eth into their wallet. Backed by the Ethereum Foundation, ENS will likely become the defacto standard for name registration in Ethereum. Topics covered in this episode: Alex and Nick’s respective backgrounds and roles in the Ethereum Foundation How the Internet’s Domain Name System works The problems and pain points with DNS and how it is governed today What is ENS and what problems it is addressing The ENS auction system and how names are registered The different parties involved in ENS ENS’s technical architecture and governing smart contract The current governance model of ENS and future plans for increased decentralization of governance ENS’s economic model and technical roadmap Episode links: Ethereum Name Service ENS Registrar ENS Github Project ENS Gitter Channel ENS Twitter Bot This episode is hosted by Meher Roy and Sébastien Couture. Show notes and listening options: epicenter.tv/183

Björeman // Melin
Avsnitt 67: En golfklapp för Cloudflare

Björeman // Melin

Play Episode Listen Later Mar 5, 2017 73:21


p>Det 67:e dramatiska avsnittet i landets i övrigt kanske inte mest dramatiska podcast: Det kanske blir en fin GÄST i podden framöver! Tävlingsresultatet, såhär långt, avslöjas. Nytt makalöst avsnitt av Den makalösa, ute NYSS Jocke sålde en massa retrodatasaker och överlevde. hela den skakande berättelsen! Cloudflare-buggen. Fredrik förundras över att så få kräver C-språkens avgång. Jocke ser ofullständigt tänk kring säkerhet, Fredrik ser funderingar kring val av programmeringsspråk. Go vs. C! Overcast 3.0! Brusreducerande lurar kan närma sig rent beroende. Vad mycket det bullrar i omvärlden! ftp.retrodatorer.se - Jocke pratar om något som kommer att läcka utanför landets gränser! Transmits minnesläckor! Plötsligt snackar vi Blockstack! Jocke sågade huvudet av ett vildsvin – allt om varför och hur det var! Twitterrific-kickstartern! Och det är inte alla som gillar semlor. Länkar Haproxy ACL – access control list Owncloud Rubber duck debugging Trinidad scorpion Nginx Taylors and Jones Super cars-musiken Excalibur Den makalösa-avsnittet om Arrival Turbo Outrun Kickstart Cloudflares rapport om sitt problem Buffer overrun-problem Rust Go Overcast 3 Fredriks text om brusreducerande lurar ftp.retrodatorer.se Transmit – eminent FTP-klient för Mac, minnesläcka till trots Filezilla Cyberduck Radar – Apples bugghanteringssystem Blockstack Läsvärt paper om Blockstacks erfarenheter och uppkomst Domännamnssystem Blockkedja Bitcoin Fredrik menade Bitcoin när han sa “Bittorrent-noder” App.net Blockstack på Github Haiku Google tech talk om Haiku Let’s encrypt Twitterrific för Mac-kickstartern Craig Hockenberry Mutant: Mechatron– Mutant: Maskinarium på engelska Steinbrenner & Nyberg Jocke blev intervjuad på Nyheter24 Netmail Två nördar - en podcast. Fredrik Björeman och Joacim Melin diskuterar allt som gör livet värt att leva. Fullständig avsnittsinformation finns här: https://www.bjoremanmelin.se/podcast/avsnitt-67-en-golfklapp-for-cloudflare.html.

Take Up Code
157: DNS: Domain Name System.

Take Up Code

Play Episode Listen Later Nov 14, 2016 9:37


Why do we need a system for managing domain names?

Healthcare Information Security Podcast
The Challenge of Defending the Domain Name System

Healthcare Information Security Podcast

Play Episode Listen Later Nov 7, 2016


Info Risk Today Podcast
The Challenge of Defending the Domain Name System

Info Risk Today Podcast

Play Episode Listen Later Nov 7, 2016


Banking Information Security Podcast
The Challenge of Defending the Domain Name System

Banking Information Security Podcast

Play Episode Listen Later Nov 7, 2016


Careers Information Security Podcast
The Challenge of Defending the Domain Name System

Careers Information Security Podcast

Play Episode Listen Later Nov 7, 2016


Credit Union Information Security Podcast
The Challenge of Defending the Domain Name System

Credit Union Information Security Podcast

Play Episode Listen Later Nov 7, 2016


Data Breach Today Podcast
The Challenge of Defending the Domain Name System

Data Breach Today Podcast

Play Episode Listen Later Nov 7, 2016


Government Information Security Podcast
The Challenge of Defending the Domain Name System

Government Information Security Podcast

Play Episode Listen Later Nov 7, 2016


Pod Academy
Cyber sovereignty: The global Domain Name System in China

Pod Academy

Play Episode Listen Later Apr 17, 2016 22:45


The internet has long been seen as a force of global connection,  But this notion of a global internet has never been entirely accurate. Language barriers, access limitations, censorship and the human impulse to stay within your own social circles contribute to us staying local.  And then there is the larger architecture of the internet.  This podcast looks at at how this architecture, specifically the Domain Name System (DNS) has been used and developed in China to localize control there. In this podcast, Adriene Lilly talks to Séverine Arsène, a researcher at the French Centre for Research on Contemporary China in Hong Kong and Chief Editor of China Perspectives – a journal dedicated to cultural, political and economic trends in China. She is also author of the recent article Internet Domain Names in China: Articulating Local Control with Global Connectivity part of a special feature of China Perspectives 'Shaping the Chinese Internet' The internet has long been seen as a force of global connection, bringing together people of different cultural, political and economic backgrounds. Understood as a horizontal network and a community that is structurally decentralized. But this notion of a global internet has never been entirely accurate. Language barriers, access limitations, censorship and the human impulse to stay within your own social circles contribute to us staying local. Beyond social constraints, there is the larger architecture of the internet to take into account. Essential structures that hold the internet in place, yet remain mostly unknown. Today, we're looking at how this architecture has been used and developed in China to localize control there. Understanding the Domain Names System is a big step in understanding the architecture of the internet. The Domain Names System, or DNS, is the global addressing system for the internet. You can think of the DNS like a phonebook. It takes numbers (IP addresses) and attributes them to names (domain names). When you type in an address in your browser (i.e.podacademy.org) your using the DNS to look up and call the number in this global phonebook. This global system is coordinated by the Internet Corporation for Assigned Names and Numbers or ICANN. China was a major pioneer in using the DNS as a political tool, creating a vast web of regulation, censorship and blocking. This has been an evolving system since the early days of the internet, and continues to change to this day. Only last month,a new draft law was reported that could force website owners operating in China to apply for China-base domain names – this means websites ending in .com or .net must also register with .cn or Chinese character domain names like .中国(meaning “.China”) or .公司 (meaning “.Corporation”). Like many similar regulations, the draft of this law is vague in its wording and its exact implications are yet to be seen. In this episode Séverine discusses how laws like this have evolved over time and what they might really mean. “The very point of using the DNS to block particular websites, or using keyword filtering, is to have a selective blocking or a selective connection to the global internet. It enables the Chinese state to have the best of both. The best of the global internet: access to trade, to fashion trends, to self-expression in a certain way - it helps people to vent off, express their identities, their wills, without necessarily being critical about the state of their own country. And, at the same time is allows a certain amount of political control...” This selective access has become known as 'The Great Firewall of China.' The term can be misleading, implying an internet that is structurally isolated from the rest of the world when, in reality, it is more a 'selective' access. “...the term “Great Firewall” was invented at the end of the 1990s/2000s, it is a very powerful image to represent a separated network that would be really very different than the rest of the...

Taming the Terminal
TTT 27b of n - DNS

Taming the Terminal

Play Episode Listen Later Oct 23, 2015


This is the second part of a two-part installment looking at the Domain Name System, or DNS. DNS is a critical cog in the internet's wheel because it translates between human-friendly domain names, and computer-friendly IP addresses.

Taming the Terminal
TTT 27a of n - DNS

Taming the Terminal

Play Episode Listen Later Oct 23, 2015


This is the first part of a two-part installment looking at the Domain Name System, or DNS. DNS is a critical cog in the internet's wheel because it translates between human-friendly domain names, and computer-friendly IP addresses.

The Record
Seattle Before the iPhone #7 - John Chaffee

The Record

Play Episode Listen Later Mar 28, 2014 67:20


This episode was recorded 16 May 2013 live and in person at Omni's lovely offices overlooking Lake Union in Seattle. (Check out the OmniFocus 2 public beta!) You can download the m4a file or subscribe in iTunes. (Or subscribe to the podcast feed.) John Chaffee is a co-founder of BusyMac which makes the awesome BusyCal. John talks about being a Mac developer in the '90s, what it was like at Now Software, and how he got tired of mobile and came back to the Mac. This episode is sponsored by Squarespace. Easily create beautiful websites via drag-and-drop. Get help any time from their 24/7 technical support. Create responsive websites — ready for phones and tablets — without any extra effort: Squarespace's designers have already handled it for you. Get 10% off by going to http://squarespace.com/therecord. And, if you want to get under the hood, check out their APIs at developers.squarespace.com. This episode is also sponsored by Microsoft Azure Mobile Services. Mobile Services is a great way to provide backend services — syncing and other things — for your iPhone, iPad, and Mac apps. If you've been to the website already, you've seen the tutorials where you input code into a browser window. And that's an easy way to get started. But don't be fooled: Mobile Services is deep. You can write in JavaScript in your favorite text editor and deploy via Git. Good stuff. Things we mention, in order of appearance (roughly): BusyMac BusyCal Now Software Extensis Farallon SplashData PhoneNet connectors AppleTalk Berkeley Mac Users Group (BMUG) Berkeley, CA QA A/UX Desktop publishing Mac iici SCSI Santa Barbara Mac Store Pagemaker Mac 512 VIP Technologies Atari ST Apple IIgs Lotus 1-2-3 Taxes Mac SE/30 Portland Bay Area San Jose System 7 1991 Now Utilities Dave Riggle Claris MacWrite Filemaker Pro Bento 1990 Macworld Expo Floppy disks iCal Now Up-to-Date Macworld Expo Boston Compuserve Windows Altura Mac2Win Qualcomm Osborne Effect Dotcom Bubble Aldus Fetch Quark MacMall OnOne Software 1999 Adobe InDesign OpenDoc Mac OS X Carbon AppKit NetNewsWire Office Space Getty Images PhotoDisx 2001 Palm PDA Handspring Visor PalmGear Handango SplashPhoto SplashMoney SplashID SplashShopper SplashWallet Windows Mobile Symbian Android SplashBlog Instagram 2006 SixApart Movable Type 2007 Mac App Store BusyCal, LLC Google WWDC RSS Safari/RSS Google (Partly) Shuts Down CalDAV MobileMe SyncServices iCloud Sandboxing JCPenney's Apple Pulls out of Macworld Twitter AirPlay Apple TV Type A Personality Domain Name System BusySync HotSync iCloud Core Data Syncing iCloud Key/Value Storage ActiveSync ExchangeWebService Blackberry

Software Engineering Institute (SEI) Podcast Series
Why Organizations Need a Secure Domain Name System

Software Engineering Institute (SEI) Podcast Series

Play Episode Listen Later Sep 6, 2011 20:51


Use of Domain Name System security extensions can help prevent website hijacking attacks. Listen on Apple Podcasts.

CERIAS Security Seminar Podcast
Scott Hollenbeck, Provisioning Protocol Challenges in an Era of gTLD Expansion

CERIAS Security Seminar Podcast

Play Episode Listen Later Aug 24, 2011 58:49


The number of generic top-level domains in the Internet's Domain Name System has been increasing slowly since 2000. In July 2011 the Internet Corporation for Assigned Names and Numbers (ICANN) approved a long-awaited plan to significantly increase the number of generic top-level domain names. With a specific focus on users of the Extensible Provisioning Protocol (EPP), this presentation will describe the practical challenges faced by participants in the domain name provisioning ecosystem in the face of evolving domain name management requirements. About the speaker: Scott Hollenbeck is the Director of Applied Research for Verisign. In this capacity he manages the company's efforts to explore and investigate strategic technology areas in collaboration with university partners. Mr. Hollenbeck is the author of the Extensible Provisioning Protocol (EPP), a standard protocol for the registration and management of Internet infrastructure data including domain names. He has served as a member of the Internet Engineering Steering Group of the Internet Engineering Task Force, where he was the responsible area director for several working groups developing application protocol standards. He received a Bachelor's degree in Computer Science from the Pennsylvania State University and a Master's degree in Computer Science complemented by a graduate certificate in Software Engineering from George Mason University.

CRE: Technik, Kultur, Gesellschaft
CRE099 Domain Name System

CRE: Technik, Kultur, Gesellschaft

Play Episode Listen Later Oct 22, 2008 120:58


Das Domain Name System (DNS) ist eines der essentiellsten Basisdienste des Internets und hat sich technisch in den letzten 20 Jahren nur zögerlich entwickelt. Allerdings hat sich DNS in der Zeit zu einer delikatesten weltweiten politischen Diskurse entwickelt. Im Gespräch mit Tim Pritlove erläutert Frank Michlick, welche Organisationen heutzutage die Geschicke des DNS hauptsächlich beeinflussen und welche Themen die DNS-Szene primär beschäftigen und ausmachen. Im weiteren Verlauf wird besprochen: wie lukrativ das Geschäft mit Domains und Werbung online ist, welche Gebühren im Domainhandel anfallen, warum Leute auf Werbung klicken, Datenschutz und Datenredundanz bei Domain-Eigentümer-Datenbanken, was die fünf Rs des Domainsystems sind, wie Domains eingetragen werden und später zwischen verschiedenen Providern transferiert werden können, was den Domainmarkt und den Aktienmarkt verbindet.

Pension Sprachschule

Domain Name System - or - Desoxyribonukleinsaeure

German Words Explained

Domain Name System - or - Desoxyribonukleinsaeure

AllThingsGerman.net

Domain Name System - or - Desoxyribonukleinsaeure

CERIAS Security Seminar Podcast
Dan Massey, Securing the Internet's Domain Name System

CERIAS Security Seminar Podcast

Play Episode Listen Later Oct 5, 2005 45:06


This talk considers security challenges facing the Internet's Domain Name System (DNS). The DNS is one of the most widely used and least secure Internet systems. Viirtually every Internet application relies on the DNS to convert names into IP addresses and the DNS provides a wide range of other critical mappings such as identifying mail servers and locate services. But despite its importance, the original DNS design gave very little thought to security and a variety of misdirection and denial of service attacks are possible. For example, a web browser relies on the DNS to convert www.purdue.edu into an IP address. The DNS supplies the web browser with an IP address (more precisely an "A" resource record set) such as 129.82.100.64 (is this address correct?). If this address is wrong, the browser will be directed to the wrong site. If the DNS fails to return a response, the browser will not be able to load the desired web page. Currently, both the operational and research communities are making considerable efforts to improve DNS security. After nearly a decade of development, the IETF has standardized DNS Security Extensions that add public key authentication into the DNS. The hierarchical structure of the DNS is leveraged to authenticate public keys, keys can be managed offline, and the signatures allow a resolver to authenticate a response. However several open issues remain, including key revocation, support for dynamic updates, resolver security policies, incremental deployment, and commercial challenges. The DNS Security Extension enable a number of new techniques, but basic problems on denial of service remain. The research community has largely focused on denial of service attacks against critical top level servers could potentially cause considerable damage to the DNS service. This has led to proposals for replacing the DNS tree with a distributed hash table attacking a few critical top level servers. This talk will argues that, despite some major flaws, the DNS Security Extensions provide the necessary tools to build a robust and secure DNS. By using these tools appropriately, a wholesale replacement of the DNS system by other approaches can and should be avoided. About the speaker:

CERIAS Security Seminar Podcast
Dan Massey, "Securing the Internet's Domain Name System"

CERIAS Security Seminar Podcast

Play Episode Listen Later Oct 4, 2005


This talk considers security challenges facing the Internet's Domain Name System (DNS). The DNS is one of the most widely used and least secure Internet systems. Viirtually every Internet application relies on the DNS to convert names into IP addresses and the DNS provides a wide range of other critical mappings such as identifying mail servers and locate services. But despite its importance, the original DNS design gave very little thought to security and a variety of misdirection and denial of service attacks are possible. For example, a web browser relies on the DNS to convert www.purdue.edu into an IP address. The DNS supplies the web browser with an IP address (more precisely an "A" resource record set) such as 129.82.100.64 (is this address correct?). If this address is wrong, the browser will be directed to the wrong site. If the DNS fails to return a response, the browser will not be able to load the desired web page. Currently, both the operational and research communities are making considerable efforts to improve DNS security. After nearly a decade of development, the IETF has standardized DNS Security Extensions that add public key authentication into the DNS. The hierarchical structure of the DNS is leveraged to authenticate public keys, keys can be managed offline, and the signatures allow a resolver to authenticate a response. However several open issues remain, including key revocation, support for dynamic updates, resolver security policies, incremental deployment, and commercial challenges. The DNS Security Extension enable a number of new techniques, but basic problems on denial of service remain. The research community has largely focused on denial of service attacks against critical top level servers could potentially cause considerable damage to the DNS service. This has led to proposals for replacing the DNS tree with a distributed hash table attacking a few critical top level servers. This talk will argues that, despite some major flaws, the DNS Security Extensions provide the necessary tools to build a robust and secure DNS. By using these tools appropriately, a wholesale replacement of the DNS system by other approaches can and should be avoided.