TCP Monitoring – Everything you need to know

When you run an online business, you want to be sure that it stays online. So there is no better way than to set up a monitoring service. You can choose different protocols and methods of monitoring. One of the most common ones is TCP Monitoring.

Why should you monitor your server?

The main reason why you should monitor your server is to be sure that it is online. 

It is not uncommon to have different problems like incorrect settings, DDoS attacks, hardware malfunction, and more, and experience downtime (offline time). Unfortunately, if you don’t have an active monitoring system, you won’t get any notification when downtime happens.

During the downtime, your clients won’t be able to use your site, application, or service, which can lead to losses and a damaged reputation.

(more…)

An introduction to DNS records & How to check them?

DNS records – Definition

DNS records are simple instructions that are associated with a particular domain name. In the DNS zone, the full collection of entries is compiled in a zone file. All of this information is stored on the authoritative DNS server for the relevant domain name. Each record serves a certain purpose. As a result, they are all extremely important for the domain’s proper operation.

(more…)

7 Fundamental DNS terms explained in a simple way

In our article, we will see several DNS terms that will assist you in managing your domain name as effectively as possible. So, let’s begin.

Domain Name System

The Domain Name System (DNS) is a global system that connects domain names to IP addresses. It has a multi-level hierarchical structure that is decentralized. It is quite useful and beneficial to people. If DNS didn’t exist, we have to input and remember every IP address on the web pages if DNS didn’t exist, which would be difficult. So, with the Domain Name System, we can employ easy-to-remember domain names and the page will load. It’s really simple. 

More basic DNS terms you should know

(more…)

How does the Host command work?

Host command explained

The Host command is a built-in utility software with a command-line interface (CLI) for DNS probing. You could find it pre-installed on most Linux distros like – Ubuntu, Linux Mint, Red Hat, or macOS. It serves perfectly for network diagnostics. In addition, the most common use of host command is to complete DNS lookups and check different information about a domain name and its DNS records.

 It is a very light and quick tool that can give you data about different DNS records, such as A, AAAA, MX, NS, SOA, and more. In addition, it can provide you with information for the host, for instance, its IP addresses or check nameservers.

Valuable Linux Host command examples

(more…)

Ping command – definition and details

Ping command

Ping command is one of the built-in network diagnostic commands that you have inside your OS (Windows, Linux, macOS, FreeBSD, etc.). Ping is used for checking the connectivity between your device and the target that cloud be a hostname like google.com or IP address like 192.168.2.1.

Ping, by default, will send 4, 32-byte packets to the target using the ICMP (Internet control message protocol).

How does Ping command work? Detailed explanation

Default result of a Ping command

(more…)

What is a DNS amplification attack?

What a scary combination! Just by reading “attack”, you can feel goosebumps. Then, when “amplification” is added, you can visualize an attack whose power could be increased to damage even more.

What is a DNS amplification attack?

The DNS amplification attack is the type of DDoS attack where a hacker spoofs its IP address and changes it to the target’s IP address, then performs a DNS query access to open, public recursive DNS servers to saturate the target (system) with DNS response traffic. The amplification comes from the answer, which may be many times bigger than the original request. 

(more…)

How does the DMARC record work?

The DMARC record explained.

The short acronym DMARC stands for Domain-based Message Authentication, Reporting, and Conformance. It is a mechanism, which provides the email receivers and senders to define if a particular message is legitimately from the sender. And also, what action to follows if it isn’t. The DMARC record helps recognize more easily phishing, and spam messages received in the users’ mailbox. It also assists in keeping these emails away from there. 

Example of DMARC

(more…)

DNS troubleshooting – commands

You can troubleshoot different DNS problems using the built-in commands that you already have on your computer. No matter if you are a Windows, Linux, or macOS user, you have various commands included in your OS. Here are the 5 most popular DNS troubleshooting commands that you should know and how to use them.

Traceroute (Linux and macOS) / Tracert command (Windows)

Traceroute command on Linux and macOS or Tracert on Windows is a built-in software that you can use for DNS troubleshooting. With this one, you can understand better the route of the DNS queries. You will see each individual hop with their response time, hostname, and IP address, and you will see a complete picture of the route to the target.

(more…)