[ggcsquicksig] Re: Since you go on line for Quicken or banking...inform yourself about DNS Cache Poisoning

  • From: "guidop6" <guidop6@xxxxxxxxxxx>
  • To: <ggcsquicksig@xxxxxxxxxxxxx>
  • Date: Sun, 20 Dec 2009 17:50:01 -0800

So where is the info to test my dns? Is it at http://opendns.com (?)
Ernie Pitz
  ----- Original Message ----- 
  From: Russ 
  To: ggcsquicksig@xxxxxxxxxxxxx 
  Sent: Sunday, December 20, 2009 4:38 PM
  Subject: [ggcsquicksig] Re: Since you go on line for Quicken or 
banking...inform yourself about DNS Cache Poisoning


  When using Quicken 2009 & 2010 Rental Property Version, Quicken addresses
  the rental deposit problem and tracks it for all tenants.

  Russ 

  -----Original Message-----
  From: ggcsquicksig-bounce@xxxxxxxxxxxxx
  [mailto:ggcsquicksig-bounce@xxxxxxxxxxxxx] On Behalf Of Will Kaefer & Mary
  Hearn
  Sent: Sunday, December 20, 2009 10:29 AM
  To: ggcsquicksig@xxxxxxxxxxxxx
  Subject: [ggcsquicksig] Re: Since you go on line for Quicken or
  banking...inform yourself about DNS Cache Poisoning

  When using a split transaction you may be using a different payee such as 
  "deposit".  There is no place on the various parts of the split to put a 
  payee except perhaps in the memo field, but it is not the "payee" field. 
  There for when you do a find and you are looking for a "payee" it will not 
  find it.  Will
  ----- Original Message ----- 
  From: "Irma" <irmbo@xxxxxxxxxxx>
  To: <ggcsquicksig@xxxxxxxxxxxxx>
  Sent: Sunday, September 28, 2008 8:06 PM
  Subject: [ggcsquicksig] Re: Since you go on line for Quicken or 
  banking...inform yourself about DNS Cache Poisoning


  > Hi Babette et al,
  >
  > I have a question about the find function and splitting categories (in v.
  > 2006).  I discovered that a tenant's rent deposit doesn't show up when I 
  > use
  > find to show a history of those deposits.  The deposit was split, and I 
  > can
  > only find it by searching for it manually and opening up the information 
  > in
  > the split transaction.  Why doesn't it show up when I search for it using
  > the name in the memo field as all of the previous ones do?  Maybe it's 
  > time
  > to get v. 2008.
  >
  > Thanks,
  > Irma
  > ----- Original Message ----- 
  > From: "Babette" <ggcsquicksig@xxxxxxxxxxx>
  > To: <ggcsquicksig@xxxxxxxxxxxxx>
  > Sent: Wednesday, August 27, 2008 11:37 AM
  > Subject: [ggcsquicksig] Re: Since you go on line for Quicken or
  > banking...inform yourself about DNS Cache Poisoning
  >
  >
  >> Thanks John.  It's so nice to have you reading with us!
  >> Babette
  >>  ----- Original Message ----- 
  >>  From: John King
  >>  To: ggcsquicksig@xxxxxxxxxxxxx
  >>  Sent: Tuesday, August 26, 2008 2:14 PM
  >>  Subject: [ggcsquicksig] Re: Since you go on line for Quicken or
  >> banking...inform yourself about DNS Cache Poisoning
  >>
  >>
  >>  Hi Barbara,
  >>
  >>  The DNS problem is not on your computer but on the DNS server run by 
  >> your
  >>  ISP.
  >>
  >>  There are patches for Firefox and also Internet Explorer which should be
  >>  installed periodically, but they are different problems.
  >>
  >>  John
  >>
  >>  ----------------------------------------------------
  >>  This mailbox protected from junk email by MailFrontier Desktop
  >>  from MailFrontier, Inc. http://info.mailfrontier.com
  >>
  >>
  >>  > -----Original Message-----
  >>  > From: ggcsquicksig-bounce@xxxxxxxxxxxxx
  >>  > [mailto:ggcsquicksig-bounce@xxxxxxxxxxxxx] On Behalf Of Barbara Hansen
  >>  > Sent: Tuesday, August 26, 2008 12:58 PM
  >>  > To: ggcsquicksig@xxxxxxxxxxxxx
  >>  > Subject: [ggcsquicksig] Re: Since you go on line for Quicken
  >>  > or banking...inform yourself about DNS Cache Poisoning
  >>  >
  >>  >
  >>  > Does anyone know if Mozilla by Firefox is patched?
  >>  >
  >>  >
  >>  > ----- Original Message ----
  >>  > From: Babette <ggcsquicksig@xxxxxxxxxxx>
  >>  > To: SIGLIST <ggcsquicksig@xxxxxxxxxxxxx>
  >>  > Sent: Monday, August 25, 2008 12:56:46 PM
  >>  > Subject: [ggcsquicksig] Since you go on line for Quicken or
  >>  > banking...inform yourself about  DNS Cache Poisoning
  >>  >
  >>  > DNS stands for "Domain Name System" - the system that allows
  >>  > you to type in the name of a web site and becomes interpred
  >>  > by the net as a net address, which is numerical.  Due to
  >>  > hacker nastiness, it's possible to type in the name of say,
  >>  > the Bank of America, and be taken to a false site that looks
  >>  > just like BofA, but is set up to capture your User Name and Password.
  >>  >
  >>  > If you're using Comcast or ATT as your provider, you're
  >>  > probably safe, because they've applied a patch to avoid this
  >>  > problem.  However, it's worth knowing about and testing for,
  >>  > just to be safe.
  >>  >
  >>  > Today, Steve Shank notified the Steering Committee of the
  >>  > following information he's posted to our GGCS web site:
  >>  >
  >>  > "I posted some advice as a link on our home page
  >>  > (www.ggcs.org) , even though AT&T and Comcast, which serve
  >>  > most of our members, appear to be patched.
  >>  >
  >>  > Will mention this at the GM tomorrow."
  >>  >
  >>  >
  >>  > I found the following item about the problem in Common Sense
  >>  > Security Newsletter, which I receive and often find helpful.
  >>  >
  >>  > In the last paragraph, he suggests using "open DNS", with
  >>  > directions for doing so. Steve Vance says he's been using
  >>  > Open DNS for a long time and it works fine.  In any event,
  >>  > take the time to go to the GGCS site (www.ggcs.org) , click
  >>  > on the link to DNS information and test your hookup.
  >>  >
  >>  > Steve Shank also gives you two other article on the subject
  >>  > to scan if you wish.
  >>  >
  >>  > Babette
  >>  >
  >>  > ****  WHAT IS THE DNS FLAW AND WHAT DOES IT MEAN TO YOU?  ****
  >>  >
  >>  > If you type in www.amazon.com to get to the online retailer's
  >>  > site, you are actually going to 207.171.160.0. That is the IP
  >>  > address for the Amazon web site, and your computer is
  >>  > directed to the IP address through a process handled by
  >>  > Domain Name System (DNS) Servers. These servers are the
  >>  > computers throughout the Internet that translate the IP
  >>  > addresses into names so that you don't have to remember
  >>  > 72.14.207.99 when you want to search for something - you just
  >>  > type in www.google.com and there you are.
  >>  >
  >>  > When a new domain is registered a primary DNS Server is
  >>  > assigned, and this server lets other DNS Servers know that
  >>  > there is a new domain at the IP address assigned to that
  >>  > domain. Over the course of time (usually within 24 hours) all
  >>  > of the other DNS Servers on the Net get updated to reflect
  >>  > the new domain / IP combination. Until the DNS Server your
  >>  > Internet Service Provider (ISP) uses has that information you
  >>  > could see an error message indicating that the domain is
  >>  > invalid. When your DNS Server does not know the new domain /
  >>  > IP combination, is asks other DNS Servers for that
  >>  > information, and eventually all of them are up to date.
  >>  > Instead of having to ask other servers each time a request
  >>  > for .commonsensessecurity.info is made, the DNS Servers cache
  >>  > (store) the information, and this is where a problem can come in.
  >>  >
  >>  > DNS was not originally designed with security in mind, and it
  >>  > is possible to "poison" the cache with fraudulent domain /IP
  >>  > combinations. This means that a web site designed to look
  >>  > like Amazon could be the one you go to instead of the real
  >>  > Amazon site, and you would have no way of knowing. All of the
  >>  > information you enter there would be recorded by the
  >>  > criminals that set up the site and poisoned the DNS cache,
  >>  > and they could use it however they want.
  >>  >
  >>  > Several months ago a researcher found a major flaw in the way
  >>  > that DNS Servers handled their task, and was working with a
  >>  > lot of other people to get this flaw patched. Unless everyone
  >>  > patched their DNS Servers, it would do no good, and although
  >>  > a lot of companies were willing to apply the patch there were
  >>  > a few hold outs who wanted more information before they would
  >>  > agree to make the changes.  In the process of disclosing that
  >>  > information, it was leaked to the web and active cache
  >>  > poisoning tools were soon available to those who wanted to use them.
  >>  >
  >>  > The good news is that the majority of DNS Servers have been patched.
  >>  >
  >>  > The bad news is that there is a flaw in the patch that needs
  >>  > to be corrected.
  >>  >
  >>  > As one researcher put it, it is the difference between having
  >>  > a hole in your boat and having a small leak - the leak allows
  >>  > you to bail out the water until help can arrive while the
  >>  > hole is almost sure to sink the boat before anything can be
  >>  > done. So even though the major problem has been resolved,
  >>  > there is still more work to do.
  >>  >
  >>  > There are several things that you can do to make your
  >>  > computer as resistant to DNS cache poisoning as possible, but
  >>  > the easiest is to use Open DNS at  http://opendns.com.  There
  >>  > is nothing to install, no files to change, no registry hacks
  >>  > to make - just a change in the DNS settings that your web
  >>  > browser uses. The site walks you through the process with
  >>  > step-by-step directions tailored to your operating system.
  >>  > If you know how to change the DNS settings and want to do it
  >>  > yourself, their name servers are 208.67.222.222 and
  >>  > 208.67.220.220.  Even though your ISP provides DNS settings
  >>  > when you set up your Internet connection with them, you can
  >>  > use any valid DNS to get to the Internet, and using the Open
  >>  > DNS Servers will help keep you safer until the final patches
  >>  > are in place.
  >>  >
  >>  > ____________________________________________________________
  >>  >
  >>  >
  >>  > GGCSQUICKSIG is the Email list for members of the Golden Gate
  >>  > Computer Society's Quicken Special Interest Group.
  >>  >
  >>  > TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" -
  >>  >      Email to: ggcsquicksig@xxxxxxxxxxx
  >>  >
  >>  > TO UNSUBSCRIBE: Send an Email Message to:
  >>  > ggcsquicksig-request@xxxxxxxxxxxxx
  >>  >    In the "Subject": line, type "unsubscribe" (without the quotes).
  >>  >
  >>  >
  >>  >
  >>  >
  >>  > GGCSQUICKSIG is the Email list for members of the Golden Gate
  >>  > Computer Society's Quicken Special Interest Group.
  >>  >
  >>  > TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" -
  >>  >      Email to: ggcsquicksig@xxxxxxxxxxx
  >>  >
  >>  > TO UNSUBSCRIBE: Send an Email Message to:
  >>  > ggcsquicksig-request@xxxxxxxxxxxxx
  >>  >    In the "Subject": line, type "unsubscribe" (without the quotes).
  >>  >
  >>  >
  >>  >
  >>  >
  >>  >
  >>  >
  >>  >
  >>
  >>  GGCSQUICKSIG is the Email list for members of the Golden Gate Computer
  >> Society's Quicken Special Interest Group.
  >>
  >>  TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" -
  >>       Email to: ggcsquicksig@xxxxxxxxxxx
  >>
  >>  TO UNSUBSCRIBE: Send an Email Message to:
  >> ggcsquicksig-request@xxxxxxxxxxxxx
  >>     In the "Subject": line, type "unsubscribe" (without the quotes).
  >>
  >>
  >>
  >>
  >>
  >>
  >> GGCSQUICKSIG is the Email list for members of the Golden Gate Computer
  >> Society's Quicken Special Interest Group.
  >>
  >> TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" -
  >>     Email to: ggcsquicksig@xxxxxxxxxxx
  >>
  >> TO UNSUBSCRIBE: Send an Email Message to:
  >> ggcsquicksig-request@xxxxxxxxxxxxx
  >>   In the "Subject": line, type "unsubscribe" (without the quotes).
  >>
  >>
  >>
  >>
  >>
  >>
  >>
  >
  > GGCSQUICKSIG is the Email list for members of the Golden Gate Computer 
  > Society's Quicken Special Interest Group.
  >
  > TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" -
  >     Email to: ggcsquicksig@xxxxxxxxxxx
  >
  > TO UNSUBSCRIBE: Send an Email Message to: 
  > ggcsquicksig-request@xxxxxxxxxxxxx
  >   In the "Subject": line, type "unsubscribe" (without the quotes).
  >
  >
  >
  >
  >
  > 

  GGCSQUICKSIG is the Email list for members of the Golden Gate Computer
  Society's Quicken Special Interest Group.

  TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" - 
       Email to: ggcsquicksig@xxxxxxxxxxx  

  TO UNSUBSCRIBE: Send an Email Message to:
  ggcsquicksig-request@xxxxxxxxxxxxx   
     In the "Subject": line, type "unsubscribe" (without the quotes).






  GGCSQUICKSIG is the Email list for members of the Golden Gate Computer 
Society's Quicken Special Interest Group.

  TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" - 
       Email to: ggcsquicksig@xxxxxxxxxxx  

  TO UNSUBSCRIBE: Send an Email Message to:  ggcsquicksig-request@xxxxxxxxxxxxx 
  
     In the "Subject": line, type "unsubscribe" (without the quotes).







  __________ NOD32 4704 (20091220) Information __________

  This message was checked by NOD32 antivirus system.
  http://www.eset.com


GGCSQUICKSIG is the Email list for members of the Golden Gate Computer 
Society's Quicken Special Interest Group.

TO SEND A MESSAGE TO SIGLEADER BABETTE BLOCH "OFFLIST" - 
     Email to: ggcsquicksig@xxxxxxxxxxx  

TO UNSUBSCRIBE: Send an Email Message to:  ggcsquicksig-request@xxxxxxxxxxxxx   
   In the "Subject": line, type "unsubscribe" (without the quotes).






Other related posts: