Home LookingPoint Blog

Blog

Introduction

This will be the final installment in this NSLOOKUP Primer series. Last time, I talked about MX & SPF TXT records here, but I didn’t touch on DMARC & DKIM TXT records which are also highly encouraged to help add additional layers of security to your email domain.

Continue reading

In my last nslookup blog, I talked about some basic DNS troubleshooting. If you missed it, here’s the link. This time, I wanted to dive in to how I use nslookup for email info gathering and troubleshooting.

Continue reading

So there you are in front of your computer, you know you have internet access, you can ping 8.8.8.8, but your browser isn’t working, and when you try to ping google.com, the name is unable to resolve. You think to yourself “If only I had saved that blog article about nslookup locally, so I didn’t have to depend on the internet to get all that great info!”.

Continue reading

You may have seen news reports on the Colonial Pipeline malware attack. The main questions I’ve heard from family and friends are “How did something like that happen?” and “Why couldn’t they stop it?” In my opinion, there are many reputable news agencies and other organizations that have weighed in and done very good work at explaining the intricacies of what happened. I would encourage the...

Continue reading

As threats become more sophisticated, organizations are responding by introducing layers of security that go beyond just securing your internet edge and deploying anti-virus on the desktops. A big challenge with this approach is managing the often disparate systems that make up these layers. Cisco has made huge strides to correct this with their software releases this year, but in reality, it...

Continue reading

Today, the most significant cyber threat is Ransomware – a type of malicious software designed to hold a user’s files (such as healthcare records, financial contracts, software codes, and other documents) for ransom by encrypting them and demanding the user pay a fee to decrypt them. Ransomware attacks use sophisticated infrastructure and resilient techniques to target data and hold critical...

Continue reading
1
  • There are no suggestions because the search field is empty.

Latest Tweets