Jump to content

Search the Community

Showing results for tags 'domain'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 6 results

  1. I have a domain name ending in .TK, from freenom and webhosting supplied by bplaced. Do I use freenom's DNS to add info. from bplaced or vice-versa? In other words do I tell the host of the web site about the domain, the other way around or do I have to tell each about the other? The host of the website offer their own domain buying service which confuses things (for me). freenom talk about 20202020 or 20202121 as servers and bplace talk about DNS Crec or records? I'd appreciate someone familiar running through the setup procedure as although they have tried to translate from German to English their instructions are not very clear to me. is this right?
  2. Three domains previously operated by defunct Kodi addons site TVAddons have been transferred to a law firm in Canada. With no explanation forthcoming, the security implications cannot be ignored. According to Kodi Project Manager Nathan Betzen, a third party in control of these domains could potentially do whatever they wanted to vulnerable former TVAddons users. Formerly known as XBMC, the popularity of the entirely legal Kodi media player has soared in recent years. Controversial third-party addons that provide access to infringing content have thrust Kodi into the mainstream and the product is now a household name. Until recently, TVAddons.ag was the leading repository for these addons. During March, the platform had 40 million unique users connected to the site’s servers, together transferring an astounding petabyte of addons and updates. Everything was going well until news broke last month that the people behind TVAddons were being sued in a federal court in Texas. Shortly after the site went dark and hasn’t been back since. This was initially a nuisance to the millions of Kodi devices that relied on TVAddons for their addons and updates. With the site gone, none were forthcoming. However, the scene recovered relatively quickly and for users who know what they’re doing, addons are now available from elsewhere. That being said, something very unusual happened this week. Out of the blue, several key TVAddons domains were transferred to a Canadian law firm. TVAddons, who have effectively disappeared, made no comment. The lawyer involved, Daniel Drapeau, ignored requests for an explanation. While that’s unusual enough, there’s a bigger issue at play here for millions of former TVAddons users who haven’t yet wiped their devices or upgraded them to work with other repositories. Without going into huge technical detail, any user of an augmented Kodi device that relied on TVAddons domains (TVAddons.ag, Offshoregit.com) for updates can be reasonably confident that the domains their device is now accessing are not controlled by TVAddons anymore. That is not good news. When a user installs a Kodi addon or obtains an update, the whole system is based on human trust. People are told about a trustworthy source (repository or ‘repo’) and they feel happy getting their addons and updates from it. However, any person in control of a repo can make a Kodi addon available that can do pretty much anything. When that’s getting free movies, people tend to be happy, but when that’s making a botnet out of set-top boxes, enthusiasm tends to wane a bit. If the penny hasn’t yet dropped, consider this. TVAddons’ domains are now being run by a law firm which refuses to answer questions but has the power to do whatever it likes with them, within the law of course. Currently, the domains are lying dormant and aren’t doing anything nefarious, but if that position changes, millions of people will have absolutely no idea anything is wrong. TorrentFreak spoke to Kodi Project Manager Nathan Betzen who agrees that the current security situation probably isn’t what former TVAddons users had in mind. “These are unsandboxed Python addons. The person [in control of] the repo could do whatever they wanted. You guys wrote about the addon that created a DDoS event,” Betzen says. “If some malware author wanted, he could easily install a watcher that reports back the user’s IP address and everything they were doing in Kodi. If the law firm is actually an anti-piracy group, that seems like the likeliest thing I can think of,” he adds. While nothing can be ruled out, it seems more likely that the law firm in question has taken control of TVAddons’ domains in order to put them out of action, potentially as part of a settlement in the Dish Network lawsuit. However, since it refuses to answer any questions, everything is open to speculation. Another possibility is that the domains are being held pending sale, which then raises questions over who the buyer might be and what their intentions are. The bottom line is we simply do not know and since nobody is talking, it might be prudent to consider the worst case scenario. “If it’s just a holding group, then people [in control of the domain/repo] could do whatever they can think of. Want a few million incredibly inefficient bit mining boxes?” Betzen speculates. While this scenario is certainly a possibility, one would at least like to think of it as unlikely. That being said, plenty of Internet security fails can be attributed to people simply hoping for the best when things go bad. That rarely works. On the plus side, Betzen says that since Python code is usually pretty easy to read, any nefarious action could be spotted by vigilant members of the community fairly quickly. However, Martijn Kaijser from Team Kodi warns that it’s possible to ship precompiled Python code instead of the readable versions. “You can’t even see what’s in the Python files and what they do,” he notes. Finally, there’s a possibility that TVAddons may be considering some kind of comeback. Earlier this week a new domain – TVAddons.co – was freshly registered, just after the old domains shifted to the law firm. At this stage, however, nothing is known about the site’s plans. Article source
  3. Stanners

    Free Domain

    Hi Guys Another gem this one for a free domain name. Go to: http://www.freenom.com/en/index.html?lang=en Enter the domain name you want select check availibility. Chose what domain you want Go to checkout Use drop down to select 12 Months From here enter email address and follow the bouncing ball to checkout with your new domain. After that your good to go! Again thanks to boulawan for his post about OneDrive storage. Original site the offer was posted at is http://a.v9s.win/ I just used Chrome and translated the pages if you guys want to check it out, as they some other interesting stuff
  4. By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture a sample of the invading malware, a new study suggests. The findings point toward the need for new malware-independent detection strategies that will give network defenders the ability to identify network security breaches in a more timely manner. The strategy would take advantage of the fact that malware invaders need to communicate with their command and control computers, creating network traffic that can be detected and analyzed. Having an earlier warning of developing malware infections could enable quicker responses and potentially reduce the impact of attacks, the study’s researchers say. “Our study shows that by the time you find the malware, it’s already too late because the network communications and domain names used by the malware were active weeks or even months before the actual malware was discovered,” said Manos Antonakakis, an assistant professor in the School of Electrical and Computer Engineering at the Georgia Institute of Technology. “These findings show that we need to fundamentally change the way we think about network defense.” Traditional defenses depend on the detection of malware in a network. While analyzing malware samples can identify suspicious domains and help attribute network attacks to their sources, relying on samples to drive defensive actions gives malicious actors a critical time advantage to gather information and cause damage. “What we need to do is minimize the amount of time between the compromise and the detection event,” Antonakakis added. The research, which will be presented May 24 at the 38th IEEE Security and Privacy Symposium in San Jose, California, was supported by the U.S. Department of Commerce, the National Science Foundation, the Air Force Research Laboratory and the Defense Advanced Research Projects Agency. The project was done in collaboration with EURECOM in France and the IMDEA Software Institute in Spain – whose work was supported by the regional government of Madrid and the government of Spain. In the study, Antonakakis, Graduate Research Assistant Chaz Lever and colleagues analyzed more than five billion network events from nearly five years of network traffic carried by a major U.S. internet service provider (ISP). They also studied domain name server (DNS) requests made by nearly 27 million malware samples, and examined the timing for the re-registration of expired domains – which often provide the launch sites for malware attacks. “There were certain networks that were more prone to abuse, so looking for traffic into those hot spot networks was potentially a good indicator of abuse underway,” said Lever, the first author of the paper and a student in Georgia Tech’s School of Electrical and Computer Engineering. “If you see a lot of DNS requests pointing to hot spots of abuse, that should raise concerns about potential infections.” The researchers also found that requests for dynamic DNS also related to bad activity, as these often correlate with services used by bad actors because they provide free domain registrations and the ability to add quickly add domains. The researchers had hoped that the registration of previously expired domain names might provide a warning of impending attacks. But Lever found there was often a lag of months between when expired domains were re-registered and attacks from them began. The research required development of a filtering system to separate benign network traffic from malicious traffic in the ISP data. The researchers also conducted what they believe is the largest malware classification effort to date to differentiate the malicious software from potentially unwanted programs (PUPs). To study similarities, they assigned the malware to specific “families.” By studying malware-related network traffic seen by the ISPs prior to detection of the malware, the researchers were able to determine that malware signals were present weeks and even months before new malicious software was found. Relating that to human health, Antonakakis compares the network signals to the fever or general feeling of malaise that often precedes identification of the microorganism responsible for an infection. “You know you are sick when you have a fever, before you know exactly what’s causing it,” he said. “The first thing the adversary does is set up a presence on the internet, and that first signal can indicate an infection. We should try to observe that symptom first on the network because if we wait to see the malware sample, we are almost certainly allowing a major infection to develop.” In all, the researchers found more than 300,000 malware domains that were active for at least two weeks before the corresponding malware samples were identified and analyzed. But as with human health, detecting a change indicating infection requires knowledge of the baseline activity, he said. Network administrators must have information about normal network traffic so they can detect the abnormalities that may signal a developing attack. While many aspects of an attack can be hidden, malware must always communicate back to those who sent it. “If you have the ability to detect traffic in a network, regardless of how the malware may have gotten in, the action of communicating through the network will be observable,” Antonakais said. “Network administrators should minimize the unknowns in their networks and classify their appropriate communications as much as possible so they can see the bad activity when it happens.” Antonakakis and Lever hope their study will lead to development of new strategies for defending computer networks. “The choke point is the network traffic, and that’s where this battle should be fought,” said Antonakakis. “This study provides a fundamental observation of how the next generation of defense mechanisms should be designed. As more complicated attacks come into being, we will have to become smarter at detecting them earlier.” In addition to those already mentioned, the study included Davide Balzarotti from EURECOM, and Platon Kotzias and Juan Caballero from IMDEA Software Institute. Article source
  5. On one hand, once we heard that ICANN would be selling off custom top-level domains (meaning instead of just .com, .org, or .net, you could get .anything), it was easy to assume that Google would be applying to get some of those domains. On the other hand, Google is directly responsible for the steady decline of users actually typing in full URL addresses in the first place. An annoyingly large number of users will use Google to search for "www.phonearena.com" rather than simply typing the address into the address bar. And, of course there are plenty of users who are too lazy to type the .com, and will just put "phonearena" in their Google Chome omnibox and then click away fromGoogle applies for .android, .nexus, .moto, and 98 other top-level domains there. Even so, Google has applied for an impressive 101 top-level domains. This is extra impressive because: 1) there were only 2,000 applications, meaning Google has 5% of all applications for the entire world; and, 2) the application fee alone for each of these is $185,000, meaning Google spent a cool $18.7 million just to try to obtain these domains.The list of domains that Google is applying for is varied and has the entries that you would expect, plus quite a few that are just odd. The ones you might expect include .Android, .Nexus, .Moto, .App, .YouTube, .Chrome, .Play, .Plus, .Gmail, .Google, .Search, .Hangout, and more. But, the entries you might not expect get weird and interesting very quickly, including .Dad, .Esq, .Kid, .LOL, .Meme, .PhD, and .Wow. Google hasn't really explained itself much, saying basically that it wants to "make the introduction of new TLDs a good experience for web users". It basically equates to getting more people online (so they can see more Google ads), and making them feel at home once they're on the web. Google says that it has applied for certain domains simply because of the "creative potential", like .LOL. If nothing else, this feels like Google might be building up a catalogue to sell domains like Hover or GoDaddy. Source
  6. I'm not quite sure how to phrase this query so please bear with me...?! I was using DynDNS for a hostname to map a dynamic IP for remote use for a while. Some while back I had actually paid them one time and got one of their better hostnames. Recently they changed their terms and I had to log in once a month to keep it active now that the payment is long gone. I forgot...once...it expired. The only way to get it back is to pay again and I don't want to pay them again. I know there's loads of free dynamic DNS providers and since I am far from my router I don't know which ones it will work with specifically and can't look until I visit there again. Here's what I'm curious about: I have a domain of my own - and supposing I made a subdomain of that for this=> Does anyone know if there's a way to specifically map a subdomain to another specific IP so that it could be used this way ?? I'd greatly appreciate any pointers. Thanks.
×
×
  • Create New...