OpenDNS is very fast.  Very distributed.


*ASB *(My XeeSM Profile) <http://XeeSM.com/AndrewBaker>
*Exploiting Technology for Business Advantage...*
* *
On Thu, Sep 16, 2010 at 8:28 AM, Jonathan Link <[email protected]>wrote:

> I've been using OpenDNS since the DNS poisoning problem was widely
> reported...last year?  Year before?
> Not only that, seems to be faster than our ISP's DNS servers.
>
> On Thu, Sep 16, 2010 at 8:24 AM, Andrew S. Baker <[email protected]>wrote:
>
>> OpenDNS provides similar benefits...
>>
>>
>> *ASB *(My XeeSM Profile) <http://xeesm.com/AndrewBaker>
>> *Exploiting Technology for Business Advantage...*
>> * *
>>  On Thu, Sep 16, 2010 at 6:27 AM, John Hornbuckle <
>> [email protected]> wrote:
>>
>>>   Trying it now. Love the concept—let’s see if it helps.  :)
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> *From:* Alex Eckelberry [mailto:[email protected]]
>>> *Sent:* Wednesday, September 15, 2010 12:58 PM
>>>
>>> *To:* NT System Admin Issues
>>> *Subject:* RE: #*&$&% "Security Tools" Malware
>>>
>>>
>>>
>>> Btw, we update the malware URLs of these rogues right into ClearCloud.
>>>
>>>
>>>
>>> Feel free to and the ClearCloud DNS server as a replacement to your
>>> existing DNS:
>>>
>>>
>>>
>>> http://clearclouddns.com/
>>>
>>>
>>>
>>> It’s still beta, but I think you’ll find it works quite well.  And it’s
>>> free.
>>>
>>>
>>>
>>>
>>>
>>> Alex
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> *From:* Alex Eckelberry [mailto:[email protected]]
>>> *Sent:* Wednesday, September 15, 2010 12:55 PM
>>>
>>> *To:* NT System Admin Issues
>>> *Subject:* RE: #*&$&% "Security Tools" Malware
>>>
>>>
>>>
>>> http://vipre.malwarebytes.org/
>>>
>>>
>>>
>>> Free.  And the combination really works.
>>>
>>>
>>>
>>> *From:* John Hornbuckle [mailto:[email protected]]
>>> *Sent:* Wednesday, September 15, 2010 12:20 PM
>>>
>>> *To:* NT System Admin Issues
>>> *Subject:* #*&$&% "Security Tools" Malware
>>>
>>>
>>>
>>> The “Security Tools” malware is about to drive me insane. My users keep
>>> managing to infect themselves with it, and we’re having trouble stopping it.
>>>
>>>
>>>
>>> They don’t run with admin rights, so there’s no real damage done to their
>>> systems and we can clean it up in about two minutes. But the time adds up,
>>> and I’m tired of my technicians having to waste time on it.
>>>
>>>
>>>
>>> Our antimalware software is Microsoft’s Forefront Client Security, and
>>> it’s having a tough time catching this. Every time I get infected, I send
>>> the EXE to Microsoft and they update their definitions—but the EXE’s used by
>>> the malware apparently change rapidly, and seem to constantly be a step
>>> ahead of FCS’s definitions.
>>>
>>>
>>>
>>> I can think of a couple of options that I know would stop it, like
>>> blocking all EXE’s at our web filter or using group policy to limit the
>>> running of EXE’s—but this would also prevent users from doing things like
>>> installing safe plug-ins from websites, so it’s not a first resort.
>>>
>>>
>>>
>>> Suggestions?
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> John Hornbuckle
>>>
>>> MIS Department
>>>
>>> Taylor County School District
>>>
>>> www.taylor.k12.fl.us
>>>
>>>
>>>
>>>
>>>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to