Solved

Bind DNS name server how to? easy question

Posted on 2008-09-29
8
554 Views
Last Modified: 2010-04-07
Hello
I am trying to bind my name server on my dedicated server but not sure how to do it I am using webmin as control panel

how can I bind my name server? example would be great easy and simple ways would be great

thank you
0
Comment
Question by:kamileris
  • 4
  • 3
8 Comments
 
LVL 29

Accepted Solution

by:
Michael W earned 250 total points
ID: 22602001
0
 

Author Comment

by:kamileris
ID: 22602003
just read two of them and doenst looks like right :(
0
 
LVL 20

Assisted Solution

by:edster9999
edster9999 earned 250 total points
ID: 22602009
I'm not sure if webmin can do this so I would go and edit the file.

vi /etc/bind/named.conf

look for :
        listen-on-v6 { none; };
        listen-on { 127.0.0.1; };

and change it to something like :
        listen-on-v6 { none; };
        listen-on { 216.239.59.103; 127.0.0.1; };
0
 

Author Comment

by:kamileris
ID: 22602197
Add Sender Permitted From Record

any ideas what is this?
0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 
LVL 20

Expert Comment

by:edster9999
ID: 22602229
Yes.   SPF.  
This is where you whitelist all the Addresses that are allowed to send email as you.
Example you list your home and office.  Then when someone is pumping out spam from a different IP but claiming to be you people can check your SPF and ignore it
0
 

Author Comment

by:kamileris
ID: 22602283
so I dont need to use spf?
0
 
LVL 20

Expert Comment

by:edster9999
ID: 22602332
not unless you want it.  It has nothing to do with your original question - so ignore it for the time being.
Read up on it later and decide if you want it
0
 

Author Comment

by:kamileris
ID: 22617745
i end up paying some guy to do that for me here I am just sharing the points
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Learn how to match and substitute tagged data using PHP regular expressions. Demonstrated on Windows 7, but also applies to other operating systems. Demonstrated technique applies to PHP (all versions) and Firefox, but very similar techniques will w…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now