Date First Published: 17th January 2022
Topic: Computer Networking
Subtopic: Internet Protocols
Article Type: Computer Terms & Definitions
Difficulty: AdvancedDifficulty Level: 8/10
DNS is short for Domain Name System and it can also be known as the phonebook of the internet. The purpose of DNS is to translate domain names into IP addresses, which makes it easier for people to remember and allows people to visit websites without memorising IP addresses, such as 151.101.66.137. Every domain name has an IP address, although not every domain name has its own IP address, since multiple domains can be hosted on the same server.
All requests for domains through a web browser contact the DNS servers, which translates the domain name into an IP address, sends a request to the web server, and then loads the webpage in the web browser. If DNS did not exist, people would have to remember the IP address of every website that they visit, which is much more difficult than remembering a domain name, such as example.com.
A DNS record is a written instruction made out of text and stored inside a zone file. Some DNS records include:
Some DNS records require users to specify the priority. This is often used when adding MX records that connect a domain name to a mail server, which is necessary for adding a custom email address, such as [email protected]. The lower the number, the higher the priority. For example, if there were three mail exchange servers and the first one was set with priority 10, the second one was set with priority 20, and the third one was set with priority 30, the mail flow would go to the second mail exchange server if the first one was unavailable. If the second exchange server is unavailable, the mail flow would go to the third mail exchange server with priority 30. Finally, if the third exchange server is unavailable, the mail flow would fail.
DNS does have some vulnerabilities. One of the most common types of DNS vulnerability is DNS hijacking, which can also be known as DNS poisoning or DNS redirection. DNS hijacking occurs when a DNS request that is made to a server is hijacked and forcibly redirects online traffic to malicious websites. It is a common way for scammers to redirect users to malware or fake websites. DNS hijacking can be caused by malware that manipulates a user's computer, makes changes to the hosts file or a compromised DNS server. Another type of DNS vulnerability is DNS spoofing, which occurs when modified DNS records are used for redirecting online traffic to malicious or scam sites.
TCP/IP Protocol | Application layer | BGP• DHCP • DNS • FTP • HTTP • IMAP • LDAP • MGCP • NNTP • NTP • OSPF • POP • PTP • ONC/RPC • RTP • RTSP • RIP • SIP • SMTP • SNMP • SSH • Telnet • XMPP | Transport layer | TCP • UDP • DCCP • SCTP • RSVP • QUIC | Internet layer | IP • ICMP • NDP • ECN • IGMP. | Link layer | Tunnels • PPP • MAC |
---|
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection