[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3F54D78A.25584.226826B@localhost>
From: cta at hcsin.net (Bernie, CTA)
Subject: sans.org
nslookup say:
NS1.HOMEPC.ORG is authoritative for
sans.org and incidents.org
Server: NS1.HOMEPC.ORG
Address: 66.129.1.102#53
Name: www.sans.org
Address: 65.173.218.106
and
Server: NS1.HOMEPC.ORG
Address: 66.129.1.102#53
www.incidents.org canonical name = incidents.org.
Name: incidents.org
Address: 63.100.47.45
I can get to their webs by IP and http://isc.incidents.org/, so
maybe someone infected the root servers, www CNAMEs?
On 2 Sep 2003 at 12:29, lepkie wrote:
> maybe off topic
>
> can anyone resolve www.sans.org or www.incidents.org?
> I tried several name servers and none return an A record.
>
> %> host www.sans.org ns2.berkeley.edu
> %> host www.sans.org ns1.ems.psu.edu
> %> etc ....
>
> all report not found.
>
> Did they forget to pay the reg fee?
>
>
> --
>
>
>
> Concerned about your privacy? Follow this link to get
> FREE encrypted email: https://www.hushmail.com/?l=2
>
> Free, ultra-private instant messaging with Hush Messenger
> https://www.hushmail.com/services.php?subloc=messenger&l=434
>
> Promote security and make money with the Hushmail Affiliate
> Program:
> https://www.hushmail.com/about.php?subloc=affiliate&l=427
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
-
****************************************************
Bernie
Chief Technology Architect
Chief Security Officer
cta@...in.net
Euclidean Systems, Inc.
*******************************************************
// "There is no expedient to which a man will not go
// to avoid the pure labor of honest thinking."
// Honest thought, the real business capital.
// Observe> Think> Plan> Think> Do> Think>
*******************************************************
Powered by blists - more mailing lists