So where is the info to test my dns? Is it at http://opendns.com (?) Ernie Pitz ----- Original Message ----- From: Russ To: ggcsquicksig@xxxxxxxxxxxxx Sent: Sunday, December 20, 2009 4:38 PM Subject: [ggcsquicksig] Re: Since you go on line for Quicken or banking...inform yourself about DNS Cache Poisoning When using Quicken 2009 & 2010 Rental Property Version, Quicken addresses the rental deposit problem and tracks it for all tenants. Russ -----Original Message----- From: ggcsquicksig-bounce@xxxxxxxxxxxxx [mailto:ggcsquicksig-bounce@xxxxxxxxxxxxx] On Behalf Of Will Kaefer & Mary Hearn Sent: Sunday, December 20, 2009 10:29 AM To: ggcsquicksig@xxxxxxxxxxxxx Subject: [ggcsquicksig] Re: Since you go on line for Quicken or banking...inform yourself about DNS Cache Poisoning When using a split transaction you may be using a different payee such as "deposit". There is no place on the various parts of the split to put a payee except perhaps in the memo field, but it is not the "payee" field. There for when you do a find and you are looking for a "payee" it will not find it. Will ----- Original Message ----- From: "Irma" <irmbo@xxxxxxxxxxx> To: <ggcsquicksig@xxxxxxxxxxxxx> Sent: Sunday, September 28, 2008 8:06 PM Subject: [ggcsquicksig] Re: Since you go on line for Quicken or banking...inform yourself about DNS Cache Poisoning > Hi Babette et al, > > I have a question about the find function and splitting categories (in v. > 2006). I discovered that a tenant's rent deposit doesn't show up when I > use > find to show a history of those deposits. The deposit was split, and I > can > only find it by searching for it manually and opening up the information > in > the split transaction. Why doesn't it show up when I search for it using > the name in the memo field as all of the previous ones do? Maybe it's > time > to get v. 2008. > > Thanks, > Irma > ----- Original Message ----- > From: "Babette" <ggcsquicksig@xxxxxxxxxxx> > To: <ggcsquicksig@xxxxxxxxxxxxx> > Sent: Wednesday, August 27, 2008 11:37 AM > Subject: [ggcsquicksig] Re: Since you go on line for Quicken or > banking...inform yourself about DNS Cache Poisoning > > >> Thanks John. It's so nice to have you reading with us! >> Babette >> ----- Original Message ----- >> From: John King >> To: ggcsquicksig@xxxxxxxxxxxxx >> Sent: Tuesday, August 26, 2008 2:14 PM >> Subject: [ggcsquicksig] Re: Since you go on line for Quicken or >> banking...inform yourself about DNS Cache Poisoning >> >> >> Hi Barbara, >> >> The DNS problem is not on your computer but on the DNS server run by >> your >> ISP. >> >> There are patches for Firefox and also Internet Explorer which should be >> installed periodically, but they are different problems. >> >> John >> >> ---------------------------------------------------- >> This mailbox protected from junk email by MailFrontier Desktop >> from MailFrontier, Inc. http://info.mailfrontier.com >> >> >> > -----Original Message----- >> > From: ggcsquicksig-bounce@xxxxxxxxxxxxx >> > [mailto:ggcsquicksig-bounce@xxxxxxxxxxxxx] On Behalf Of Barbara Hansen >> > Sent: Tuesday, August 26, 2008 12:58 PM >> > To: ggcsquicksig@xxxxxxxxxxxxx >> > Subject: [ggcsquicksig] Re: Since you go on line for Quicken >> > or banking...inform yourself about DNS Cache Poisoning >> > >> > >> > Does anyone know if Mozilla by Firefox is patched? >> > >> > >> > ----- Original Message ---- >> > From: Babette <ggcsquicksig@xxxxxxxxxxx> >> > To: SIGLIST <ggcsquicksig@xxxxxxxxxxxxx> >> > Sent: Monday, August 25, 2008 12:56:46 PM >> > Subject: [ggcsquicksig] Since you go on line for Quicken or >> > banking...inform yourself about DNS Cache Poisoning >> > >> > DNS stands for "Domain Name System" - the system that allows >> > you to type in the name of a web site and becomes interpred >> > by the net as a net address, which is numerical. Due to >> > hacker nastiness, it's possible to type in the name of say, >> > the Bank of America, and be taken to a false site that looks >> > just like BofA, but is set up to capture your User Name and Password. >> > >> > If you're using Comcast or ATT as your provider, you're >> > probably safe, because they've applied a patch to avoid this >> > problem. However, it's worth knowing about and testing for, >> > just to be safe. >> > >> > Today, Steve Shank notified the Steering Committee of the >> > following information he's posted to our GGCS web site: >> > >> > "I posted some advice as a link on our home page >> > (www.ggcs.org) , even though AT&T and Comcast, which serve >> > most of our members, appear to be patched. >> > >> > Will mention this at the GM tomorrow." >> > >> > >> > I found the following item about the problem in Common Sense >> > Security Newsletter, which I receive and often find helpful. >> > >> > In the last paragraph, he suggests using "open DNS", with >> > directions for doing so. Steve Vance says he's been using >> > Open DNS for a long time and it works fine. In any event, >> > take the time to go to the GGCS site (www.ggcs.org) , click >> > on the link to DNS information and test your hookup. >> > >> > Steve Shank also gives you two other article on the subject >> > to scan if you wish. >> > >> > Babette >> > >> > **** WHAT IS THE DNS FLAW AND WHAT DOES IT MEAN TO YOU? **** >> > >> > If you type in www.amazon.com to get to the online retailer's >> > site, you are actually going to 207.171.160.0. That is the IP >> > address for the Amazon web site, and your computer is >> > directed to the IP address through a process handled by >> > Domain Name System (DNS) Servers. These servers are the >> > computers throughout the Internet that translate the IP >> > addresses into names so that you don't have to remember >> > 72.14.207.99 when you want to search for something - you just >> > type in www.google.com and there you are. >> > >> > When a new domain is registered a primary DNS Server is >> > assigned, and this server lets other DNS Servers know that >> > there is a new domain at the IP address assigned to that >> > domain. Over the course of time (usually within 24 hours) all >> > of the other DNS Servers on the Net get updated to reflect >> > the new domain / IP combination. Until the DNS Server your >> > Internet Service Provider (ISP) uses has that information you >> > could see an error message indicating that the domain is >> > invalid. When your DNS Server does not know the new domain / >> > IP combination, is asks other DNS Servers for that >> > information, and eventually all of them are up to date. >> > Instead of having to ask other servers each time a request >> > for .commonsensessecurity.info is made, the DNS Servers cache >> > (store) the information, and this is where a problem can come in. >> > >> > DNS was not originally designed with security in mind, and it >> > is possible to "poison" the cache with fraudulent domain /IP >> > combinations. This means that a web site designed to look >> > like Amazon could be the one you go to instead of the real >> > Amazon site, and you would have no way of knowing. All of the >> > information you enter there would be recorded by the >> > criminals that set up the site and poisoned the DNS cache, >> > and they could use it however they want. >> > >> > Several months ago a researcher found a major flaw in the way >> > that DNS Servers handled their task, and was working with a >> > lot of other people to get this flaw patched. Unless everyone >> > patched their DNS Servers, it would do no good, and although >> > a lot of companies were willing to apply the patch there were >> > a few hold outs who wanted more information before they would >> > agree to make the changes. In the process of disclosing that >> > information, it was leaked to the web and active cache >> > poisoning tools were soon available to those who wanted to use them. >> > >> > The good news is that the majority of DNS Servers have been patched. >> > >> > The bad news is that there is a flaw in the patch that needs >> > to be corrected. >> > >> > As one researcher put it, it is the difference between having >> > a hole in your boat and having a small leak - the leak allows >> > you to bail out the water until help can arrive while the >> > hole is almost sure to sink the boat before anything can be >> > done. So even though the major problem has been resolved, >> > there is still more work to do. >> > >> > There are several things that you can do to make your >> > computer as resistant to DNS cache poisoning as possible, but >> > the easiest is to use Open DNS at http://opendns.com. There >> > is nothing to install, no files to change, no registry hacks >> > to make - just a change in the DNS settings that your web >> > browser uses. The site walks you through the process with >> > step-by-step directions tailored to your operating system. >> > If you know how to change the DNS settings and want to do it >> > yourself, their name servers are 208.67.222.222 and >> > 208.67.220.220. Even though your ISP provides DNS settings >> > when you set up your Internet connection with them, you can >> > use any valid DNS to get to the Internet, and using the Open >> > DNS Servers will help keep you safer until the final patches >> > are in place. >> > >> > ____________________________________________________________ >> > >> > >> > GGCSQUICKSIG is the Email list for members of the Golden Gate >> > Computer Society's Quicken Special Interest Group. >> > >> > TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" - >> > Email to: ggcsquicksig@xxxxxxxxxxx >> > >> > TO UNSUBSCRIBE: Send an Email Message to: >> > ggcsquicksig-request@xxxxxxxxxxxxx >> > In the "Subject": line, type "unsubscribe" (without the quotes). >> > >> > >> > >> > >> > GGCSQUICKSIG is the Email list for members of the Golden Gate >> > Computer Society's Quicken Special Interest Group. >> > >> > TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" - >> > Email to: ggcsquicksig@xxxxxxxxxxx >> > >> > TO UNSUBSCRIBE: Send an Email Message to: >> > ggcsquicksig-request@xxxxxxxxxxxxx >> > In the "Subject": line, type "unsubscribe" (without the quotes). >> > >> > >> > >> > >> > >> > >> > >> >> GGCSQUICKSIG is the Email list for members of the Golden Gate Computer >> Society's Quicken Special Interest Group. >> >> TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" - >> Email to: ggcsquicksig@xxxxxxxxxxx >> >> TO UNSUBSCRIBE: Send an Email Message to: >> ggcsquicksig-request@xxxxxxxxxxxxx >> In the "Subject": line, type "unsubscribe" (without the quotes). >> >> >> >> >> >> >> GGCSQUICKSIG is the Email list for members of the Golden Gate Computer >> Society's Quicken Special Interest Group. >> >> TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" - >> Email to: ggcsquicksig@xxxxxxxxxxx >> >> TO UNSUBSCRIBE: Send an Email Message to: >> ggcsquicksig-request@xxxxxxxxxxxxx >> In the "Subject": line, type "unsubscribe" (without the quotes). >> >> >> >> >> >> >> > > GGCSQUICKSIG is the Email list for members of the Golden Gate Computer > Society's Quicken Special Interest Group. > > TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" - > Email to: ggcsquicksig@xxxxxxxxxxx > > TO UNSUBSCRIBE: Send an Email Message to: > ggcsquicksig-request@xxxxxxxxxxxxx > In the "Subject": line, type "unsubscribe" (without the quotes). > > > > > > GGCSQUICKSIG is the Email list for members of the Golden Gate Computer Society's Quicken Special Interest Group. TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" - Email to: ggcsquicksig@xxxxxxxxxxx TO UNSUBSCRIBE: Send an Email Message to: ggcsquicksig-request@xxxxxxxxxxxxx In the "Subject": line, type "unsubscribe" (without the quotes). GGCSQUICKSIG is the Email list for members of the Golden Gate Computer Society's Quicken Special Interest Group. TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" - Email to: ggcsquicksig@xxxxxxxxxxx TO UNSUBSCRIBE: Send an Email Message to: ggcsquicksig-request@xxxxxxxxxxxxx In the "Subject": line, type "unsubscribe" (without the quotes). __________ NOD32 4704 (20091220) Information __________ This message was checked by NOD32 antivirus system. http://www.eset.com GGCSQUICKSIG is the Email list for members of the Golden Gate Computer Society's Quicken Special Interest Group. TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" - Email to: ggcsquicksig@xxxxxxxxxxx TO UNSUBSCRIBE: Send an Email Message to: ggcsquicksig-request@xxxxxxxxxxxxx In the "Subject": line, type "unsubscribe" (without the quotes).