Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

12/10/2009
04:14 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Free DNS Service From Comodo

Service offers three safeguards against Domain Name Server data corruption

Jersey City, NJ, December 10, 2009 - Comodo offers a free Domain Name Service (DNS) for Internet users. The advantages to using Comodo's secure DNS include security, speed, and ease of use.

A DNS is like a phonebook for a computer. When a person wants to look up a phone number, he or she looks in the phone directory for the other party's name, which corresponds with a number that a telephone can connect to. A DNS works the same way; when a person types a website address such as www.comodo.com, into a browser's search bar, the computer contacts a Domain Name Server. The DNS identifies the IP address that corresponds to the domain name, like a telephone user looking up a telephone number in the directory. The DNS server then replies to the user's browser, informing it of the IP address, and the browser duly connects.

For most Internet users, the DNS server they use is furnished by their Internet Service Provider. This process of matching human-readable domain names to machine-understandable IP addresses is part of the fabric of the Internet. It happens millions of times per day.

Rarely, the DNS database can be corrupted with incorrect IP addresses, the way a telephone directory might be printed with incorrect telephone numbers. If that happens, the Internet user may be directed to a spoof website. That site may be designed to look exactly like the site the Internet user intended to visit, and the visitor may be tricked into sharing confidential information there.

Comodo's Domain Name Service offers three safeguards against Domain Name Server data corruption.

The first advantage Comodo's secure DNS has over that of the Internet service providers lies in user security. By using a secure DNS, users will be assured that their attempts to connect to websites they trust will not be redirected to malware or phishing sites. The second advantage lies in speed. The nodes that Comodo uses for its DNS services are placed strategically around the world to ensure that a users' requests are resolved as rapidly as possible.

The third advantage of Comodo's secure DNS is in ease of use. Using Comodo's secure DNS does not require users to download any software, meaning that the only technical thing that a user has to do to set the product up is to open Internet settings in control panel and type new IP addresses in the primary DNS server boxes. Because no software is necessary, Comodo DNS also works with non-computer devices, such as wireless-enabled mp3 players and videogame consoles. To learn more, visit http://www.comodo.com/secure-dns.

Note for beginners: DNS stands for Domain Name System. It is the part of the Internet infrastructure that translates a familiar domain name, such as 'example.com' to an IP address like 123.456.789.04. This is essential because the Internet routes messages to their destinations on the basis of this destination IP address, not to the domain name. Whenever you type a domain name, your Internet browser contacts a DNS server and makes a 'DNS Query'. In simplistic terms, this query is 'What is the IP address of example.com?'. Once the IP address has been located, the DNS server replies to your computer, telling it to connect to the IP in question.

About Comodo

Comodo is a leading brand in Internet security, covering an extensive range of security software and services, including digital certificates, PCI scanning, desktop security, online faxing, and computer technical support services.

Businesses and consumers worldwide recognize Comodo as standing for security and trust. Comodo products secure and authenticate online transactions for over 200,000 businesses and have more than 18,000,000 installations of Comodo desktop security software, including an award-winning firewall and antivirus software offered at no charge.

The Comodo family of companies is committed to continual innovation, core competencies in PKI, authentication, and malware detection and prevention. As a catalyst in eliminating online crime, the companies' mission is to establish a Trusted Internet.

With US headquarters overlooking Manhattan on New Jersey's waterfront, and global resources in United Kingdom, China, India, Ukraine, and Romania, Comodo products offer intelligent security, authentication, and assurance.

Comodo -- Creating Trust Online'. For more information, visit Comodo's website.

Katharine Hadow

Comodo--Creating Trust Online

www.comodo.com

201 963-0004 x 4073

[email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.