home | archive | books | download | about us | contact us

  Main Sections

Home
Archive
Books
Download
About Us
Contact Us
  Download

Antivirus Software
Antivirus Updates
Firewall Software
Security Tools
  Microsoft Warnings

MS04-028 : Buffer Overrun in JPEG Processing (GDI+)
MS04-027 : Vulnerability in WordPerfect Converter
MS04-026 : Vulnerability in Exchange Server 5.5 Outlook Web Access
MS04-025 : Cumulative Security Update for IE
MS04-024 : Vulnerability in Windows Shell
MS04-023 : Vulnerability in HTML Help
MS04-022 : Vulnerability in Task Scheduler
MS04-021 : Security Update for IIS 4
MS04-020 : Vulnerability in POSIX
MS04-019 : Vulnerability in Utility Manager
  Sun Warnings

#220 Double Free bug in zlib compression library
#219 SEA SNMP
#218 Bytecode Verifier
#217 Java Web Start
#216 HttpURLConnection
#215 snmpdx
#214 dtspcd
#213 login
#212 rpc.ttdbserverd
#211 xntpd

Verisign moves DNS root servers 08 nov 2002

Key Internet Domain Name System (DNS) servers have been relocated to improve Internet security and stability in the wake of a recent, serious distributed denial of service attack. Verisign, which manages two root DNS servers, moved one to a different locations, connected to different parts of its network earlier this week.

It is the first time any of these servers, which are vital in managing the flow of traffic on the Net, have been moved since 1997. The company said the move would help defend against further attacks by ensure normal operations if hackers or a hardware outage crippled one server. Last month a co-ordinated attack hobbled nine of 13 root DNS servers across the globe. Seven stopped responding almost entirely and the performance of two was severely degraded during the hour-long attack on October 21.

AP reports that Verisign's servers were not among those crippled by the attack. The servers were on the same network as those attacked, so the company felt it prudent to move at least one of them. After the October 21 attack ceased services from all 13 root DNS servers were quickly restored. Thanks to its short duration, and the way DNS lookups are organised, few users would have noticed any disruption. If the attacks had continued we would have been looking at a far more serious problem.


Amazon
© 1997-2012 Security-Solutions.net   All Rights Reserved.  Privacy Statement.