Return-Path: <sentto-279987-4084-1008655649-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Mon, 17 Dec 2001 22:18:07 -0800 (PST) Received: (qmail 21593 invoked by uid 510); 18 Dec 2001 06:16:07 -0000 Received: from n2.groups.yahoo.com (216.115.96.52) by all.net with SMTP; 18 Dec 2001 06:16:07 -0000 X-eGroups-Return: sentto-279987-4084-1008655649-fc=all.net@returns.groups.yahoo.com Received: from [216.115.97.187] by n2.groups.yahoo.com with NNFMP; 18 Dec 2001 06:07:29 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_1_3); 18 Dec 2001 06:07:28 -0000 Received: (qmail 91599 invoked from network); 18 Dec 2001 06:07:28 -0000 Received: from unknown (216.115.97.172) by m6.grp.snv.yahoo.com with QMQP; 18 Dec 2001 06:07:28 -0000 Received: from unknown (HELO red.all.net) (12.232.125.69) by mta2.grp.snv.yahoo.com with SMTP; 18 Dec 2001 06:07:28 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fBI68Uv06183 for iwar@onelist.com; Mon, 17 Dec 2001 22:08:30 -0800 Message-Id: <200112180608.fBI68Uv06183@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 17 Dec 2001 22:08:28 -0800 (PST) Subject: [iwar] [fc:NIPC.URGES.DNS.AWARENESS] Reply-To: iwar@yahoogroups.com Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit *NIPC URGES DNS AWARENESS Urging heightened awareness of DNS risks, the National Infrastructure Protection Center (NIPC) last week warned corporations of the need to ensure that their domain name servers are fully redundant and geographically dispersed to avoid a single point of failure. "Highlights," a monthly NIPC newsletter, said that a DNS-related single point of failure presents "a risk of total loss of electronic connectivity" for many companies. Security experts recommend that multiple domain name servers be placed on different network segments and be dispersed across geographic locations. NIPC suggests companies make arrangements for mutual backup or contract with a third party to provide additional name servers. <a href="http://www.nipc.gov/publications/highlights/2001/highlight-01-11.pdf">http://www.nipc.gov/publications/highlights/2001/highlight-01-11.pdf> Source: SECURITY WIRE DIGEST, VOL. 3, NO. 95, DECEMBER 17, 2001 ------------------------ Yahoo! Groups Sponsor ---------------------~--> Need new boots for winter? Looking for a perfect gift for your shoe loving friends? Zappos.com is the perfect fit for all your shoe needs! http://us.click.yahoo.com/ltdUpD/QrSDAA/ySSFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 21:00:00 PST