Right now, throughout sites on the Internet, there are references to security issues dealing with the Domain Name System (DNS) daemons running on a multitude of operating systems. Via CERT: http://www.us-cert.gov/cas/techalerts/TA08-190B.html Person who (claims) found it: http://www.doxpara.com/ (blog) http://www.doxpara.com/?p=1162 (specific post where it begins) The DNS resolvers at ipHouse have been updated to the current revision(s) of BIND where applicable. Other systems are being tested to verify that this vulnerability is not present in the servers at ipHouse. I'd like to encourage anyone running their own server(s) to please look at updating them, regardless of when it was installed or last updated. Yes, it is a little more work to double check, and in many cases, patch or update, but it is good work. Note: ipHouse does not officially sanction the site of Dan Kaminsky by any means, just that I believe there is good information in his blog, as well as some tongue-in-cheek comments. Support can be reached Monday thru Friday from 8:00am until 8:00pm, Saturdays from 11:00am until 4:00pm via phone at 612-337-6340, or via email at [log in to unmask] -- Mike Horwath [log in to unmask] ipHouse - Welcome home!