Simple DNS Plus 8.0 Build 108 (x64) | 11.7 Mb

The simple yet powerful DNS server for Windows . What makes Simple DNS Plus "simple" is its user interface and automation features. All options and settings are available directly from the intuitive Windows user interface.

Strong security features:
Protects against DNS spoofing (a.k.a. "cache poisoning")
"DNS spoofing" is a term used for malicious cache poisoning where forged data is placed in the cache of DNS server.
Spoofing attacks can result in serious security problems, for example causing users to be directed to wrong Internet sites or e-mail being routed to non-authorized mail servers.
Simple DNS Plus automatically protects against this in several ways:
- It automatically filters out any response received which does not match a sent request.
- All records in received DNS answers are checked for authority, and records for which the answering DNS server does not have authority are ignored.
- It uses random requests IDs.
- It sends outbound DNS requests from random port numbers (a.k.a. "port randomization").
- It queues identical requests to prevent "birthday attacks".
- It has an option to "Ignore responses not coming from the IP address that request was sent to".
- It has an option to "Ignore responses which do not echo the request question section".
- It has an option to randomize the letter casing of the query name of outgoing DNS requests, and only accept responses which correctly echo this (DNS0X20).
Restrict recursion by client IP address
You can specify exactly which clients (by IP address / subnet) that you want the server to perform recursion for.
Response Filtering stops "DNS rebinding attacks"
Web-browsers generally allow any script, Java object, Flash object, etc. to communicate via HTTP / TCP with the server that served a web-page for as long as that web-page is open in the browser. This is controlled by the host name specified in the web-page URL. A "DNS rebinding attack" is done by having the DNS record for the host name time out very quickly (low TTL and other tricks) and then serve a new IP address for the host name in response to the next DNS request ("rebinding"). The new IP address would be the private/local IP address of an intranet server or device at your location. Now with a bit of scripting, the attacker can in effect use your browser as a gateway to your entire intranet - completely bypassing your firewall. The same type attack may also be possible with other Internet applications that rely on host names for security. Browser companies are taking steps to prevent this in new browser versions, but it is much more efficient and secure to stop this type of attack at the DNS level by filtering out any private/local IP addresses in DNS responses from outside DNS servers.
"Stealth DNS" option
A hacker may use a software utility known as a "DNS port scanner" to search for potential targets. This software sends dummy DNS requests to a range of IP addresses on different service ports simply to register which addresses/ports respond.
Any addresses/ports that responded will then be probed further for possible vulnerabilities.
Simple DNS Plus has a special "stealth" option which makes it invisible to such DNS port scanners, by not responding to a DNS request unless it is for data in local zones or originates from a client offered recursion.
Secure Zone Transfers
Avoid revealing all your server addresses and other potentially sensitive data by limiting who can zone transfer your zones.
Simple DNS Plus supports secure zone transfer (TSIG authenticated). Both zone transfer requests and responses are authenticated so this provides protection in two ways; it prevents unauthorized transfers (only people / servers with the correct key can transfer), and it ensures data integrity on secondary servers (not possible to spoof / inject false data during transfers).
Zone transfers can also be limited by IP address for cases where the secondary DNS server does not support TSIG signed zone transfers (less secure but much better than letting anyone zone tranfer your data).
IP address blocking
Ignore packets from known offenders (by IP address). You specify how long a block should be in effect along with comments about why the IP address was blocked for easy reference. Such comments will also be shown in the log when a requests from the IP address is ignored.
IP addresses that make too many requests to quickly (possible DoS attack) can either automatically be added to to the block list, or be rate limited.
An editable list of trusted IP addresses are not not subject to automatic blocking / rate limiting.
Windows 10, Windows 8 / 8.1, Windows 7
-

DOWNLOAD
uploadgig
Kod:
https://uploadgig.com/file/download/5aEE7a7f7766B43E/bKzBBWAe_Simple.DNS.Plus.8.0.108.rar
nitroflare
Kod:
http://nitroflare.com/view/CCCE930FD3E5798/bKzBBWAe_Simple.DNS.Plus.8.0.108.rar
rapidgator
Kod:
https://rapidgator.net/file/bb718f265a2bca4fa4230cbbeff05bc8/bKzBBWAe_Simple.DNS.Plus.8.0.108.rar
turbobit
Kod:
https://turbobit.net/ahxda1qkoapq/bKzBBWAe_Simple.DNS.Plus.8.0.108.rar.html