Domain Name System (DNS)

The Domain Name System (DNS) is a hierarchical naming system built on a distributed database for computers, services, or any resource connected to the Internet or a private network. Most importantly, it translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.
An often-used analogy to explain the Domain Name System is that it serves as the phone book for the Internet by translating human-friendly computer hostnames into IP addresses. For example, the domain name www.example.com translates to the addresses 192.0.32.10 (IPv4) and 2620:0:2d0:200::10 (IPv6).
The Domain Name System makes it possible to assign domain names to groups of Internet resources and users in a meaningful way, independent of each entity’s physical location. Because of this, World Wide Web (WWW) hyperlinks and Internet contact information can remain consistent and constant even if the current Internet routing arrangements change or the participant uses a mobile device. Internet domain names are easier to remember than IP addresses such as 208.77.188.166 (IPv4) or 2001:db8:1f70::999:de8:7648:6e8 (IPv6). Users take advantage of this when they recite meaningful Uniform Resource Locators (URLs) and e-mail addresses without having to know how the computer actually locates them.
The Domain Name System distributes the responsibility of assigning domain names and mapping those names to IP addresses by designating authoritative name servers for each domain. Authoritative name servers are assigned to be responsible for their particular domains, and in turn can assign other authoritative name servers for their sub-domains. This mechanism has made the DNS distributed and fault tolerant and has helped avoid the need for a single central register to be continually consulted and updated.
In general, the Domain Name System also stores other types of information, such as the list of mail servers that accept email for a given Internet domain. By providing a worldwide, distributed keyword-based redirection service, the Domain Name System is an essential component of the functionality of the Internet.
Other identifiers such as RFID tags, UPCs, International characters in email addresses and host names, and a variety of other identifiers could all potentially use DNS.[1][2]
The Domain Name System also specifies the technical functionality of this database service. It defines the DNS protocol, a detailed definition of the data structures and communication exchanges used in DNS, as part of the Internet Protocol Suite.

Sourse: http://en.wikipedia.org/wiki/Domain_Name_System

شیوه جدید هک کردن حساب‌های تلگرام در ایران

 

19024_L16x9 امروزه به‌خاطر استفاده روزافزون مردم در سراسر جهان، ازجمله ایرانی‌ها، از اپلیکیشن‌های موبایلی، فرصت مناسبی به هکرها داده تا بتوانند از این محبوبیت برای رخنه به حساب‌های کاربران این ابزارها سوءاستفاده کنند. یکی از اپلیکیشن‌های محبوب این روزها در ایران، اپلیکیشن پیام‌رسان «تلگرام» است. نزدیک به ۱۸ میلیون نفر به‌صورت تقریبی از این «اپ» در ایران استفاده می‌کنند

یک حمله‌ی هکری که چند روزی‌ست بین کاربران شایع شده، این فرصت را در اختیار هکرها می‌گذارد تا با استفاده از جعل نام و تصویر تلگرام، طعمه را به دام انداخته و داخل حساب کاربری تلگرام فرد شوند

مراحلی که هکر انجام می‌دهد به این طریق است که، با یک نام جعلی و با تصویر لوگوی تلگرام برای شما پیامی همانند زیر ارسال می‌شود

tegram1

در نگاه اول، ممکن است به اشتباه متوجه شوید که این پیام را خود تلگرام ارسال کرده و وقتی نام کاربری را هم بررسی می‌کنید، اثری از نام کاربری و شماره تلفن وجود ندارد و شما ممکن است کمی بیشتر دچار اشتباه شوید اما درست فکر می‌کنید، این حساب کاربری تلگرام نیست. همان‌طور که در تصویر فوق قابل مشاهده است، هکر از شما درخواست شماره تلفن کرده است. بعد از این مرحله، هکر با وارد کردن شماره تلفن در سایت یا اپلیکلیشن تلگرام، خود را به عنوان کاربری جدید(با شماره شما) به سایت معرفی کرده و کد تائید از سوی تلگرام، از طریق پیامک یا پیام در داخل اپلیکیشن تلگرام برای شما ارسال می‌شود

برای امتحان این موضوع کد اشتباهی در اختیار هکر گذاشته شده و همان‌طور که در تصویر پایین قابل مشاهده است، هکر بار دیگر درخواست کد صحیح کرده است. اگر کد واقعی در اختیار هکر قرار می‌گرفت، او می‌توانست به حساب دسترسی پیدا کند

telegram2

 

Source: Manoto1 website

 

Domain and Environment!

Do you need to advertise your business, product or …?  printed one?!

Do you know how much paper will be wasted for that?! Unfortunately, in everyday life, we can see lots lots of advertising papers around us! What about our environment?!

There is a need to conserve our environment. Paper industry is a one of the largest users of wood for which trees are cut, leading to destructive effect on the environment.

Technology has come to help! Online technology is developed and capable of handling almost all kinds of transaction related to companies, organizations, colleges, institutes etc …

In spite of technology offering an environment friendly alternative, the use of paper has not reduced except in some countries.

We easily help you to start your domain and website in order to stop using paper, and start using e-paper! unlimited pages! and it can send your message more extend in almost all countries! Join us! Have a domain, Have a green world 🙂

netbaran

How to protect your computer ?

How to protect your computer from hackers, spyware and viruses

These recommendations are very simple rules which should be observed. I will try to add more and give you details soon.

When a computer is attacked by a virus or hacker, first it’s the owners fault! So be sure you observe all these rules:

  1. Install Anti-Virus Software: and set it on auto-update or do it at least once in a week. Which kind of Antivirus?! Most of are effective, but the important thing is how to setup it ! if you don’t know how to set up an anti-virus, let us know.
  2. Update Windows and all Softwares: The most important software to keep up to date is your Windows operating system. It is essential to have Automatic Updates turned on and set to download and install updates automatically.
  3. Install only Trusted Softwares: Sometimes programs will ask you to install other programs during the install of the first application. Be careful of that because it’s usually a spyware. Install software from famous names only.
  4. Avoid P2P File Sharing Software: Avoid using P2P softwares which usually let you download music, movie and picture. Most of them are illegal and they may use your pc as an upload center and send spyware to your pc, So don’t use them if you are not a professional.
  5. Run Virus Scans Regularly: If you’re not in the mood to scan every day, at least run a scan once a week. Actually, setup a schedule for your computer in your anti-virus software to run a scan late at night or whenever you don’t use your computer and that way you won’t be bothered with a slow computer.
  6. Be careful what you attach to your computer: This is a more common way to transfer viruses than you might think. Everyone now has a USB flash disk that they carry around on their key chains, ready to snap into any computer. But who knows what your viruses are on your friends computers and what accidentally got transferred to their USB disk. A lot of virus programs will auto launch right when the USB disk is put into the computer, so you don’t even have to open or download any of the files to be infected.
  7. Avoid Shady Web Sites: Never go to illegal websites such as porn and …, You are DEFINITELY will have some viruses or spywares if you browse these sites.
  8. Turn on windows firewall: If you’re running Windows XP, make sure Windows Firewall is turned on. A firewall prevents hackers from gaining access to your computer by limiting the number of ports that are open to the public. Also, when buying a wireless router, make sure it has a built in firewall.
  9. Use a Complex Password for Login: This means that you should already have a password to login to your computer. Not having a password at all is not a good idea. Create a password for all user accounts and make sure it’s complex. Complex means it should have numbers, upper case characters, lower case characters, and symbols. This makes it way more difficult for a hacker to get into your computer.