Reverse DNS lookup

Results: 118



#Item
1Measuring the effects of DNSSEC deployment on query load Jelte Jansen∗ NLnet Labs May 1, 2006

Measuring the effects of DNSSEC deployment on query load Jelte Jansen∗ NLnet Labs May 1, 2006

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
2Going Wild: Large-Scale Classification of Open DNS Resolvers Marc Kührer Thomas Hupperich

Going Wild: Large-Scale Classification of Open DNS Resolvers Marc Kührer Thomas Hupperich

Add to Reading List

Source URL: www.ei.rub.de

Language: English - Date: 2015-10-12 10:49:50
3IPv6 PTR and Lookup Usage  Understanding IPv6 Reverse DNS Basics The PTR Record 

IPv6 PTR and Lookup Usage Understanding IPv6 Reverse DNS Basics The PTR Record 

Add to Reading List

Source URL: ipv6.he.net

- Date: 2009-08-15 19:05:45
    4Implications of Netalyzr’s DNS Measurements Nicholas Weaver Christian Kreibich  Boris Nechaev

    Implications of Netalyzr’s DNS Measurements Nicholas Weaver Christian Kreibich Boris Nechaev

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:04
    5Master in System and Network Engineering  Analysis of DNS Resolver Performance Measurements Supervisors: Yuri Schaeffer

    Master in System and Network Engineering Analysis of DNS Resolver Performance Measurements Supervisors: Yuri Schaeffer

    Add to Reading List

    Source URL: www.nlnetlabs.nl

    Language: English - Date: 2015-08-24 06:37:35
    6ARIN-­‐2014-­‐6	
    Remove	
  Opera4onal	
  Reverse	
   DNS	
  Text	
   (formerly	
  “Remove	
  7.1”)	
  

    ARIN-­‐2014-­‐6   Remove  Opera4onal  Reverse   DNS  Text   (formerly  “Remove  7.1”)  

    Add to Reading List

    Source URL: www.arin.net

    Language: English - Date: 2015-02-02 17:53:40
    7SensePost  How far can automation be taken? How much intelligence can be embodied in code? How generic can automated IT security assessment tools really be? This presentation will attempt to show which areas of attacks l

    SensePost How far can automation be taken? How much intelligence can be embodied in code? How generic can automated IT security assessment tools really be? This presentation will attempt to show which areas of attacks l

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:36
    8

    PDF Document

    Add to Reading List

    Source URL: www.imc.org

    Language: English - Date: 2004-03-03 03:39:27
    9FluxBuster	
    Early	
  Detec+on	
  of	
  Malicious	
  Flux	
  Networks	
  via	
   Large-­‐Scale	
  Passive	
  DNS	
  Traffic	
  Analysis	
    Roberto	
  Perdisci	
  

    FluxBuster   Early  Detec+on  of  Malicious  Flux  Networks  via   Large-­‐Scale  Passive  DNS  Traffic  Analysis   Roberto  Perdisci  

    Add to Reading List

    Source URL: www.caida.org

    Language: English - Date: 2015-05-04 18:42:52
    10

    PDF Document

    Add to Reading List

    Source URL: www.rdns.com.au

    Language: English - Date: 2015-04-16 23:40:49