DNS block lists & why you NEED to use them!
We all know about IPBL’s or “IP Block Lists” (a.k.a IP Blackhole Lists). They’re great right? What about applying the same logic to DNS? DNS works like this: On your computing device you browse to yahoo.com and your computing device says…hey, I don’t happen to know what yahoo.com is…hey DNS […]Read More
IP Block Lists
There are many ways to protect your network. One of the many ways EITS works to protect their clients is with a “honey pot” the unsuspecting hacker or hacker bot finds. They or their mechanisms try to hack any number of services (mail, ftp, ssh, etc) which we detect then […]Read More