no-nonsense, objective, experienced, honest

The Blog of an honest Consultant.


DNSSEC Requirements concerning IPAM

The IPAM system, which is used to manage DNS should support the following capabilities with regards to DNSSEC:
# Hosting of DNSSEC-enabled Zones
_- incl. [Mehr lesen…]

Admin - 14:46 @ dns, security, dnssec


Protecting your Domain Names

* Review Access to Domain Name Registrars
* Review DNS Roles and Responsibilities
* Employee Transitions
* Update all Registration Information
* Use Roles for Domain Registration Information
* Don’t Use Personal Email Addresses
* Protect against Phishing Attacks
* Credential Updates
* Two-Factor Authentication (2FA) for Registrar Accounts
* Understand Registrar Security Policies, Tools, and Processes
* Review the Privacy Registration Options
* Review and Maintain Records in your Zone
* DNS Zone File Revision Control
* Is your Domain Locked at the Registrar?


Admin - 14:15 @ general, dns, security


Reasons for long or short TTLs

There are many reasons why network operators choose long or short TTLs

Longer caching results in faster responses: a longer TTL enables caching for longer periods, and cache hits are far faster than retrieving answers from authoritative servers, as the .uy experience illustrates. [Mehr lesen…]

Admin - 17:53 @ general, dns, security


Digitization in Facility Management

When it comes to facility management, it means managing buildings, maintaining technical facilities and repair equipment. [Mehr lesen…]

Admin - 13:07 @ general, dns, dhcp, security, ipv6


DNS Unleashed

The Domain Name System (DNS) is an important core network service, because it serves as the central phonebook. [Mehr lesen…]

Admin - 12:27 @ general, dns, security