Difference between revisions of "Domain Name System"
From Bobs Projects
Bob Edwards (Talk | contribs) |
Bob Edwards (Talk | contribs) |
||
Line 12: | Line 12: | ||
* [http://www.manpagez.com/man/3/res_query/ resolver(3)] manual page at manpagez.com | * [http://www.manpagez.com/man/3/res_query/ resolver(3)] manual page at manpagez.com | ||
* [http://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/DNS_Exfiltration_2011-01-01_v1.1.pdf DNS as a Covert Channel Within Protected Networks] from US Dept. of Energy | * [http://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/DNS_Exfiltration_2011-01-01_v1.1.pdf DNS as a Covert Channel Within Protected Networks] from US Dept. of Energy | ||
+ | * [http://arstechnica.com/security/2016/02/extremely-severe-bug-leaves-dizzying-number-of-apps-and-devices-vulnerable/ Extremely severe bug leaves dizzying number of software and devices vulnerable] at arstechnica.com |
Revision as of 15:54, 17 February 2016
Domain Name System (DNS) is a name lookup system, typically used to map hostnames on the Internet to Internet addresses.
The most common DNS server implementation for Linux and other FOSS operating systems is the Internet Systems Corporation (ISC) implementation of the Berkeley Internet Name Daemon (bind), now in version 9.
External Links
- Domain Name System at Wikipedia
- Bind9 at the Debian Wiki
- List of Internet top-level domains at Wikipedia
- RFC 1035 - DOMAIN NAMES - IMPLEMENTATION AND SPECIFICATION at IETF.org
- C Programming with the Resolver Library Routines from ch. 14 of "DNS and BIND" by Cricket et. al.
- resolver(3) manual page at manpagez.com
- DNS as a Covert Channel Within Protected Networks from US Dept. of Energy
- Extremely severe bug leaves dizzying number of software and devices vulnerable at arstechnica.com