View Single Post
  #1   (View Single Post)  
Old 22nd July 2008
crayoxide crayoxide is offline
Fdisk Soldier
 
Join Date: May 2008
Posts: 46
Default DNS Security: Old Vulnerabilities, New Exploits with Cricket Liu

http://www.snpnet.com/customer_pub/I...008/index.html
Quote:
Originally Posted by infoblox.com
In this webinar, DNS expert Cricket Liu and security researcher Dan Kaminsky discuss the latest CERT-published DNS security advisory (VU800113) that exposes most name servers, including BIND and Microsoft, to chace poisoning . Learn about the exposure and how to implement a robust DNS infrastructure that mitigates against this and other types of vulneabilities including distributed denial of service, malicious open recursive name servers, and unrestricted zone transfers.
This means there is AUDIO and it is presented in a flash base environment.

Last edited by crayoxide; 23rd July 2008 at 05:31 AM. Reason: *sigh*
Reply With Quote