「DNS」の共起表現一覧(1語右で並び替え)

DNS

1語右で並び替え

該当件数:73件

  • xample, a mail client attempting to resolve the DNS A record for an internal mail server may receiv
  • Another reason to use a proxy is that while the DNS allows multiple MX records which can be used to
  • own and destroyed some sections of the specific DNS and dedicated hosting server racks used by Wiki
  • ered The greatest threat to the security of the DNS as matched against other alternatives.
  • 2000, the control of the TLD was transferred to DNS Belgium.
  • DNS cache poisoning is a security or data integrity
  • an unintended result of a misconfiguration of a DNS cache or from improper software design of DNS a
  • Also, DNS cannot easily allow more than about a dozen MX
  • not aware of the DDoS attack when they made the DNS change, claiming to have been "blackholed" (or
  • way and the connector applications with a valid DNS configuration can provide a mobile device with
  • ver component's port number and/or IP address / DNS, connection retry interval, direct or reverse c
  • users could be identified as such by the use of DNS databases.
  • DNS denotes did not start.
  • DNS denotes "did not start"
  • : Fastest Loser Qualifier, '-': Did not start, ' DNS', Did not qualify, 'DQ' - Disqualified, 'n/a' N
  • DNS: Did not show
  • DNS Did not start - Q Qualified for final
  • nd: CR: Championship record; DSQ: Disqualified; DNS: Did Not Start
  • points deducted (scoring protest turned down) - DNS Did not start - Q Qualified for final
  • DNS Did not start - OR Olympic record - Q Qualified
  • er could protect ten addresses and one personal DNS domain name.
  • il authentication system designed to verify the DNS domain of an e-mail sender and the message inte
  • ver, enzymatic methods are usually preferred to DNS due to their specificity.
  • October 2010, a new method involving spoofing a DNS entry has been found to root 1.4.1 Nooks.
  • make use of Demon's mail, news, IRC, web-proxy, DNS, etc. servers.
  • DNSBL anti-spam solutions rely on DNS; false DNS results therefore interfere with the
  • s control of services including DHCP, TFTP, and DNS for the purpose of performing network-based ope
  • 1938: DNS French Grand Prix, German Grand Prix (1), Swiss
  • e acknowledged that the practice of involuntary DNS hijacking contravenes PECR, and EC Directive 95
  • redirecting traffic to their own IRCd servers, DNS hijacking, and null routing.
  • a interactive ssh login under a generic Dynamic dns host name.
  • This TLD was added to the DNS in July 2010.
  • col (IP) addressing and the domain name system ( DNS), including approving new generic top-level dom
  • ition, he was principal author of the Multicast DNS, IP Anycast, and Operator Requirements of Infra
  • er Internet applications, which assume that the DNS is implemented according to the standard specif
  • ping develop TCP/IP and the Domain Name System ( DNS), ISI contributed to the Net by editing the "Re
  • reduces the permanent traffic through external DNS lookups.
  • DNS MetaServers
  • e of this domain is to reserve a segment of the DNS name space reserved for the use of museums; a n
  • ompromise occurs when data is introduced into a DNS name server's cache database that did not origi
  • DNS on November 17, 2005, Lake Placid, New York, U.
  • 3,5-Dinitrosalicylic acid ( DNS or DNSA, IUPAC name 2-hydroxy-3,5-dinitrobenzoi
  • This includes, but is not limited to, DNS or Domain Name System Servers, (Network Authent
  • These contracts contain the same DNS poisoning based filtering concept as the law.
  • The DNS protocol requires that a query for a nonexisten
  • available tunnel brokers by looking up the TXT DNS records from "_aiccu.sixxs.net".
  • The domain's DNS records were removed shortly thereafter, but ha
  • effects of takedown, rock phishers often update DNS records over the course of the phishing attack.
  • g the SixXS staff to add an entry to the global DNS records.
  • re is a special function allowing the inrush of DNS requests to be distributed to different devices
  • ference with BitTorrenting by redirecting local DNS results for the top BitTorrent trackers to a lo
  • The museum domain was entered into the DNS root on 20 October 2001, and was the first spon
  • as previously available through the alternative DNS root system administered by the now-defunct Alt
  • ice unaffiliated with ICANN, via an alternative DNS root.
  • At the time, DNS round-robin with weighted nodes to account for
  • ving correctly over the VPN tunnel on a private DNS server when an NXDOMAIN response is received fr
  • Unbound is the name of a DNS server software product.
  • Zone Transfer - ask a DNS server for all it knows about a domain
  • Normally, a networked computer uses a DNS server provided by the computer user's organiza
  • Poisoning attacks on a single DNS server can affect the users serviced directly b
  • 001 by exploiting a buffer overflow in the BIND DNS server.
  • roposed at the 1996 Montreal IEPG that the root DNS servers be migrated to IP Anycast, and their wo
  • Instead of this response, EarthLink's DNS servers return several IP addresses for the HTT
  • DNS servers are generally deployed in an organizati
  • ction unnecessary, via customized authoritative DNS servers that utilize geolocation software.
  • DNS Service Discovery (DNS-SD), part of Apple's Bon
  • Cotendo also provides DNS services that can allocate content provider web
  • Neustar offers internal and external managed DNS services that play a key role in directing and
  • When installed, the system's DNS settings were changed to redirect web browsing
  • zCodec reportedly changes the machine's DNS settings, monitors the user's browsing and acts
  • a CNAME record points to can be anywhere in the DNS, whether local or on a remote server in a diffe
  • ng the Rock phish attack is the use of wildcard DNS, which is employed to resolve to variations of
  • the DNSBLs of your choice and fill them through DNS zone transfers.