Protect your privacy:
Get NordVPN
[73% off 2-year plans, 3 extra months]
- Meshnet Feature for Personal Encrypted Networks: NordVPN offers a unique feature called Meshnet, which allows users to connect their devices directly and securely over the internet. This means you can create your own private, encrypted network for activities like gaming, file sharing, or remote access to your home devices from anywhere in the world.
- RAM-Only Servers for Enhanced Security: Unlike many VPN providers, NordVPN uses RAM-only (diskless) servers. Since these servers run entirely on volatile memory, all data is wiped with every reboot. This ensures that no user data is stored long-term, significantly reducing the risk of data breaches and enhancing overall security.
- Servers in a Former Military Bunker: Some of NordVPN's servers are housed in a former military bunker located deep underground. This unique location provides an extra layer of physical security against natural disasters and unauthorized access, ensuring that the servers are protected in all circumstances.
- NordLynx Protocol with Double NAT Technology: NordVPN developed its own VPN protocol called NordLynx, built around the ultra-fast WireGuard protocol. What sets NordLynx apart is its implementation of a double Network Address Translation (NAT) system, which enhances user privacy without sacrificing speed. This innovative approach solves the potential privacy issues inherent in the standard WireGuard protocol.
- Dark Web Monitor Feature: NordVPN includes a feature known as Dark Web Monitor. This tool actively scans dark web sites and forums for credentials associated with your email address. If it detects that your information has been compromised or appears in any data breaches, it promptly alerts you so you can take necessary actions to protect your accounts.
The fifth-annual survey of domain name servers (DNS) on the public Internet—called a “Pandora’s box of both frightening and hopeful results”—was released today by The Measurement Factory in partnership with Infoblox. Cricket Liu, Vice President of Architecture at Infoblox and author of O’Reilly & Associates’ DNS and BIND, DNS & BIND Cookbook says: “Of particular interest is the enormous growth in the number of Internet-connected name servers, largely attributable to the introduction by carriers of customer premises equipment (CPE) with embedded DNS functionality. This equipment represents a significant risk to the rest of the Internet, as without proper access controls, it facilitates enormous DDoS attacks.”
Following are the key 2009 DNS survey results from the survey—along with positive, negative, or neutral “consequence” ratings—based on a sample that included 5 percent of the IPv4 address space, nearly 80 million addresses.
- NEUTRAL: There are an estimated 16.3 million name servers on the Internet; this represents a 40% increase in 2 years likely due to an explosion in the population of “non-traditional”, proxy DNS servers embedded in broadband access devices or customer premises equipment (CPE).
- VERY DISTURBING: 79.6% of the name servers are open to recursion; this represents a 27% increase in the last 2 years, likely related to the increase in proxy DNS servers in CPE. Unfortunately, all these name servers can be used maliciously to execute DDOS attacks, posing a significant threat to the Internet.
- POSITIVE: Percentage of Microsoft DNS Servers is now almost negligible at .37%; this is likely due to greater awareness of the risks of exposing Windows computers to the Internet.
- POSITIVE: Percentage of zones with one or more name servers open to zone transfers decreased to 16% from 31% (in 2008); administrators are paying closer attention to configuration of external DNS servers, realizing that they need to configure ACLs to prevent zone transfers, which can leave them open to DOS attacks.
- POSITIVE: The number of DNSSEC signed zones increased significantly—by approximately 300%; this indicates that momentum in DNSSEC adoption is increasing. This could be the result of greater awareness and adoption due to the Kaminsky vulnerability last year and support for DNSSEC signed in parent zones (.org).
Related Links: Executive Summary, Press Release