Translation

Saturday, July 7, 2012

New Windows Instructions and Rogue DNS Servers

Hi! Back with the Technology Blog, the DNSChanger is going hot now. I could tell, some people rushing to disconnect, maybe someone wiping out their hard drive, you might not know that you might not be infected by DNSChanger, but another virus or malware such as a redirecting virus (not DNSChanger).

There are two ways to figure out Windows instructions, but I'll tell you the limits first. The limits are:

85.255.112.0 through 85.225.127.255
67.2010.0.0 through 67.210.15.255
93.188.160.0 through 93.188.167.255
77.67.83.0 through 77.67.83.255
213.109.64.0 through 213.109.79.255
64.28.176.0 through 64.28.191.255

If you have these, please note that you may be infected by DNSChanger.

For windows, the complex way is to launch the Command Prompt, under Accessories under Programs in the start window, or search Command Prompt in the search bar.

Type cmd.exe.

Type ipconfig /all

Look for the entry: DNS Servers...

and check your DNS servers for the rogue DNS servers. To make it more convenient, I'm going to list them down here.

85.255.112.0 through 85.225.127.255
67.2010.0.0 through 67.210.15.255
93.188.160.0 through 93.188.167.255
77.67.83.0 through 77.67.83.255
213.109.64.0 through 213.109.79.255
64.28.176.0 through 64.28.191.255

The other way is quite simple, though you have to make sure that you're correct.

Click on Start, then My Network Places.

Select Network Connections, then click the active connection. Make sure you are not connected to another in-range, especially if you live in an apartment.

Click Support > Details and see the DNS servers. Again, take note and see if any of those DNS Servers are rogue.

Until next time...

be aware!








No comments:

Post a Comment