Testing Intelligent Routing with DNS Servers

I really do not care. DNS and IP address are old technology which will soon be replaced by Blockchain, get ready to know all the secrets why I say it is totally not secure.

Methods used to mask IP addresses:

1) VPN Servers

2) Proxy Servers

3) Brand Protect Servers

4) Masking IP address

How to check on the internet.

DNS Propegation Checker https://whatsmydns.net

Connection to VPN. You can see if your original ISP IP address is masked or not. https://speedtest.net

https://mxtools.com

https://wireshark.org

https://www.dnsstuff.com/packet-sniffers

What is 1.1.1.1?

1.1.1.1 is a fast and private way to browse the Internet. It is a public DNS resolver, but unlike most DNS resolvers, 1.1.1.1 is not selling user data to advertisers. The implementation of 1.1.1.1 makes it the fastest resolver out there.

What is DNS?

The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources.

What makes 1.1.1.1 more secure than other public DNS services?

Some other recursive DNS services may claim that their services are secure because they support DNSSEC. While this is a good security practice, users of these services are ironically not protected from the DNS companies themselves. Many of these companies collect data from their DNS customers to use for commercial purposes. Alternatively, 1.1.1.1 does not mine any user data. Logs are kept for 24 hours for debugging purposes, then they are purged.

1.1.1.1 also offers some security features not available from many other public DNS services, such as query name minimization. Query name minimization diminishes privacy leakage by only sending minimal query names to authoritative DNS servers.

What makes 1.1.1.1 the fastest recursive DNS service?

The power of the Cloudflare network gives 1.1.1.1 a natural advantage in terms of delivering speedy DNS queries. Since it has been deployed on Cloudflare’s 1000+ servers worldwide, users anywhere in the world will get a quick response from 1.1.1.1; in addition to this, these servers have access to the over 20 million+ Internet properties on the Cloudflare platform, making queries for those domains lightning-fast.

In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site that seems to contain information or a resource of value to attackers, but actually, is isolated and monitored and, enables blocking or analyzing the attackers. This is similar to police sting operations, colloquially known as “baiting” a suspect.[1]

https://en.wikipedia.org/wiki/Honeypot_(computing)

5

New Privacy controls for phone

New Privacy controls for phone

1) Able to link to a Do Not Call database

2) It is beyond a TrueCaller database where all the spam calls are compiled in a master database so you can decide to accept or reject the call.

3) You can turn on a feature that only accepts calls from your contact list.

4) If a call is masked or faked, the origins of the country will be revealed by software. GPS location can also be enabled.

5) If you receive an unwanted call you can marked it in your own phone and next time the person will be placed in a blacklist that cannot call into your phone.

6) The market for this phone features that is incorporated will be in the billions, you can decide to add to your flagship phone or incorporate it as an app.

7) With 5G phones you can decide how to route your SMS or calls thru any carriers, the fastest of every route or the cheapest route of any country or any 4G or 5G networks. Yes you can also use mapping like a DNS mapping of all carriers including if the call is via satellite and you can store and forward in case of a failure in any networks.

8) The price of data will drop and drop, Eventually all voice calls and messages will be routed thru the internet.

Using an automated script to hack every DNS Server and use it to attack a target

Downloads37719.zip

Using an automated script to hack every DNS Server and use it to attack a target

I regularly receive reader mail that presents some interesting problems and solutions. Many articles, and consequently scripts, focus on automating the setup and configuration of Microsoft Internet Information Services (IIS) 5.0 Web sites. I’ve written many such articles and scripts and even shown readers how to use Windows Management Instrumentation (WMI) to set up and configure IIS 5.0 remotely. (The WMI Web-exclusive article and code are available at http://www.winnetmag.com, InstantDoc ID 9100.)

By creating a script to automate the DNS setup and configuration, Adam has saved himself a lot of time in the routine process of creating new Web sites. Let’s look at the inner workings of the script so that you can use it in your own shop. You can download the code from http://www.winscriptingsolutions.com, InstantDoc ID 37719. For an alternative approach that uses WMI, see the sidebar “Using WMI to Automatically Configure DNS,” page 2.

Deconstructing DNS
To learn the DNS structure, Adam used the Microsoft Management Console (MMC) ADSI Edit snap-in from the Microsoft Internet Information Server Resource Kit**. ADSI Edit lets you view all the attributes for each DNS object and, in turn, look up each DNS object on the Microsoft Developer Network (MSDN). For example, you can find the Dns-Node attributes listed at http://msdn.microsoft.com/library/default.asp? url=/library/en-us/adschema/ad/win2k_c_dnsnode.asp. (Dns-Nodes are the Active Directory—AD—components that store the DNS resource records for each host.) After Adam identified the DNS structure, all he had to do was look at the values for each attribute and determine how to write the new values. However, determining the new values isn’t as simple as it might seem.**

Microsoft stores all DNS data in Octet-string format, which might be a “hangover” from UNIX because no other data in the Microsoft platform is persisted in structured storage in Octet format. Using Active Directory Service Interfaces (ADSI) to query the data is simple, but the data is virtually unreadable in Octet format. Fortunately, a COM component known as ArrayConvert, which is available at http://support.microsoft.com/?kbid=250344, lets you convert Octet data to hexadecimal data and vice versa. After the data is in hex format, converting it to decimal is a simple process.

Ads.dll, the library file containing the ArrayConvert function, is easy to install. You must first download the executable that contains the COM component and run the file to extract the necessary files to a specified location. To use the functions within the COM component from VBScript, you register the ads.dll COM component by clicking Start, Run and typing

Regsvr32 <path>/Ads.dll

where path is the location in which you saved the extracted files.

After Adam converted the DNS data from Octet format to hex format and then converted the hex format to decimal format, the data was readable and, consequently, easier to work with. Most DNS zones have a host (A) record that adds the www prefix to the domain. The only coded information in the data for this type of entry is the IP address and the serial number. The name of the record provides the www prefix. So, for example, the DNS zone for VisitCancun.com has a host (A) record named www that maps to the IP address 208.49.55.66. This mapping lets a user type www.VisitCancun.com into a browser. If the name of the host (A) record were different (e.g., www3), the user would need to type www3.VisitCancun.com to return the mapped IP address.

The rest of the data contains values that remain the same on different servers and different domains, so the decimals wouldn’t change. Rather, they appear to identify the record as a host (A) record. For Adam’s purposes, the DNS zone also required an MX record, which tells querying computers where to look for that domain’s mail. The data for these records was stored in Octet format, but the values were much longer than the host (A) records’ and took more time and patience to figure out.

Many of the decimals were related to the mail server’s name: Some were the ASCII representation of its letters, others represented the number of characters in each segment (not including the decimals because they segment the name), and one represented the overall length of the mail server’s name. Other decimals stood for the serial number, the mail server priority, and the IP address, and some decimals never change. Adam identified all the decimals by comparing different hex strings and through simple trial and error. He simplified the entire process by adding a section of variables at the top of the script that you can easily modify to meet your needs.

Dns.vbs
The dns.vbs script opens a connection directly into Microsoft DNS and creates all the information necessary for a new Web site, including a new DNS forward lookup zone, an MX record, and four hosts. Each host links a name to an IP address. The script defaults to setting up a parent host named foo.com, a WWW host named www.foo.com, a MAIL host named mail.foo.com, a WEBMAIL host named webmail.foo.com, and an FTP host named ftp.foo.com. (You can customize each host name and IP address in the script.)

Dns.vbs starts by dimensioning variables. Next, as the code at callout A in Listing 1 shows, the script gives you an “opt out” choice with a message box so that you don’t accidentally run the script. The script then instantiates ads.dll, the MSDN conversion utility. After completing this process, the script assigns values (i.e., names and IP addresses) to variables for later use. This part of the script is the only section you need to edit for your needs. The code at callout B contains several sample values and descriptions.

At this point, the script uses the user-defined DNS variables to do calculations, string manipulations, and parsing and converts some of the data to hex format. After the initial calculations are complete, the script connects to AD and creates DNS objects. As the code at callout C shows, the script creates the objects for the DNS zone first. Notice that the script releases COM objects from memory by setting them to Nothing. Because COM components consume large amounts of memory, cleaning up after them is good programming practice.

Next, the script creates the MX record and parent host after performing some complicated computations. Because these two values are saved in the same attribute, the script creates an array and saves the values, as the code at callout D shows.

After creating the MX record and parent host (A) record, the script creates the remaining hosts: WWW, MAIL, and WEBMAIL. The code at callout E shows how the WWW record is created. Finally, if you set FTP to “YES” in the variables section at the beginning of the script, the script creates the FTP host (A) record, as the code at callout F shows.

To run the script, use cscript.exe. From the command line, navigate to the folder in which you placed the dns.vbs script, then type

Cscript dns.vbs

You must log on with domain administrator permissions to run the script. Figure 1 shows dns.vbs running. Notice that appropriate screen I/O appears onscreen to alert the user where the dns.vbs script is in the process of running. The script runs quickly (i.e., in a few seconds), depending on your network configuration.

After the script finishes running, you can check the resulting configurations in DNS. Launch the MMC DNS server snap-in (go to Start, Programs, Administrative Tools, then select DNS). Expand the Forward Lookup Zones folder to see the DNS configuration you’ve automated. Figure 2 shows the resulting DNS configuration of foo.com that the script created using the sample values provided.

I will fill in the gap after StarLink and OneWeb expired, using 50x the speeds using LiFi and low flying swarm robotics at 1/10 the costs

And it will operate below the threshold of space, above the traffic of commercial flights, no need satellite launches. I will use GPS targeting and a burst of LiFi LED like a quasar to transfer blocks of data at regular intervals, so there is no need of a 100% connectivity which is not practical, and I will pack the intensity of LiFi LED spectrum to transfer 10x to 50x the present technologies. There will be some errors and loss of data thru the air transmission with light, but everything can be corrected with Algorithms and AI. You can also easily create relay and repeaters stations. And I can easily link to my 3D radar system that covers land, sea and underseas by modifying existing Australian weather radar systems. (PS Check my previous posts on my Patreon website on the technology of Australian radar system)

https://ams.confex.com/ams/pdfpapers/123509.pdf

*Intelligent OS is the State of Art Command and Control system based on a Blockchain node that can never be hacked, it is so advanced and operates in real time where I can link all my satellites, radar, ships, aircrafts, ground forces and even submarines together to communicate and pass info in real time. Once you launch a nuclear weapon, my system will detect and destroy you even before you can come within striking distance, so there is totally no first strike advantage, it is even more than a space defence shield. US can boast all their capabilities but there is no defence force in the world can beat me on technology. I can create swarm robotics that attack in droves and all co-ordinated to break any defence any anti missile system and any weapon system. Most importantly, it helps to cut down half the time in research, creating huge productivity to solutions by the ability to segment your data into zones, link any reports or data, and the ability to use AI and ML to sample a portion of the data to find all the right answers, anybody who uses these tools do not have to be a genius, as long as you have a basic concept and logic you can find any answers in the world, and later be even more intelligent than humans. This *3D radar system is so advanced nobody in the world can beat me.

So everything is linked together using my *Intelligent OS, Control stack, App stack on *Blockchain 3.0 using *3D Search using Microsoft Hololens and Mixed Reality with VirtualBox.

1) Aircrafts, Ships, Weapon System, Radar System, even Vehicles.

2) World Trading System.

3) Financial Systems. Digital Currency.

4) Content platforms.

Hardware is everything on Neuromorphic computers. Internet is on multi-core fibres and LiFi  spread spectrum using speeds beyond 50x today`s satellite technologies.

​*Copyright by United Nations China.

Designs of the 3D browser

Must be able to showcase the above content in 3D
Must be able to link multiple screens and compare using keywords, sentences, paragraphs
Able to create zones to place the different 3D content eg 4,6,8 etc zones for the screen
Able to manipulate 3D content to move them into different zones
Layers and layers of filters to control results eg specific keywords, formulas etc
Huge cache for browser to store data

How I will link everything together via my interface which UI/UX I have already clearly demonstrated.

HTTP over QUIC is meant to be a Peer to Peer Transport layer, with the ability to fall back over HTTPS 2 over TCPIP, ideal to be designed for use in the Next Generation Internet for Blockchain. HTTP over QUIC and HTTPS over TCPIP are never meant to be compatible, and so is the application layer between the two, but the ability to switch between the 2 meant that the future browser can be used over TCPIP and Peer to Peer, creating a browser that can used in different Operating Systems. You do not need DNS Servers to be linked to an IP Address, but a Mac Address and a unique ID Blockchain node.

1) It is the greatest datamining tool, creating the greatest insight into mining for database, increasing productivity by a hundredfold, hundred of views, using AI to achieve the impossible.
2) Let me explain, the present technologies of the search engine with the browser, where tabs are used to present different webpages, will be blown away when u merged different technologies, with rule based firewall for a start, where u can specify the input/outputs, import datasets from a set of library(different library for different classes,eg like for financial industry, underwriting for insurance firms), to assess risks with mathematical formulas, with layers and filtering, with 3D and virtualisation, it is possible to present hundreds of different views, like the carousel of a 3D webpage, to see different views of the “solution”, stretching the limits of programming software, with AI.
3) I invent this productivity tool to solve the world’s problems, with it u can use it to find solutions, different paths to take, different links to employ, to teach the world my skills in troubleshooting, so that it can provide different solutions for everyone. The world’s problems is so complex, and everyone problems is uniquely different, so u need different solutions to solve different problems.
4) I am bringing the world light years ahead, where the present 64bit computers cannot handle the requisites, u need to have hardware to advance to that level, in order to compliment the advances of software. It is possible however to spread out the innovations, by coding parts of requirements to present day technologies, making improvements step by step.
5) Software companies of the world, be it open or proprietory, I challenge u to meet up to my expectations, to create next generation software, to solve problems for the world.

*My algorithms uses AI and Machine Learning to index(spider) and tag, link and compare, metadata together with content, supports all file types, and is able to separate videos into images and sound, uses voice to understand and translate and even command and control your computer, indexes everything on the world wide web into libraries of database that exists in AI servers which supports 3D searches with UI/UX I am currently developing. It is intelligent enough to store searches that was done beforehand and use it for future searches with timestamp to ensure the latest information, same with what Google searches can do today. My technology uses huge cache of storage, minimum gigabytes of storage to store your searches in a browser, which will clear once you clear your browser when you close. I see a future where temporary memory like DRAM will not be utilised when a new 3 Dimension database is invented and the transmission of data is hugely optimised, where this storage is able to accomodate both temporary memory and huge cache which present SSD cannot support. I also see a future of this 3D Browser which can be downloaded and installed in different OS that support Apple, Android, Windows and Linux where the limitations will be your hardware and GPU acceleration.

The end of Moore’s Law. I already seen it coming and waiting for the right timing to introduce all my technologies. I will use AI ML and Algorithms that sit at the kernel that will optimise CPU multi threading performance, and it will optimise everything, memory, cache, virtual, even the transfer of data between the storage using NVME, GPU and software acceleration, between Local and external data at Edge, even new technologies of 3D stacking. Only then can I realise my dreams to create my 3D Search Engine.

Technical goals prior to White Paper (mid 2020)

My goals will be after creating the neuromorphic computer is to bring it alive in blockchain. I do not believe in reinventing the wheel. I will merge all existing technologies and fill in the missing blanks. And these are my goals prior to the release of my White Paper.

1. Like Bitcoin, there’s no real identity on the blockchain. Bitcoin will be the defacto currency. I do not intend to reinvent the wheel. I will use an existing Crypto Exchange and it’s wallets but only issue Bitcoins/XRP which my clients can convert to any digital currency they want.

2. I will use XRP (Ripple) to build my P2P Financial platform and modify it’s technologies based on my needs. (This is for my P2P Platform for Financials and is separate from my Intelligent OS and 3D Search platform)

3. Voice Recognition Technology, NLP, Automatic translation, Machine Learning as a AI programming language.

4. Apps, APIs, and Algorithms will be stored in the AI Cloud. Tools will be created to port to any platforms. Indexing by spiders will comb the entire internet including video which will strip videos into images frame by frame and voices where all you need is a sample to find anything, including all types of files and images. A new browser with a new UI/UX will present data in 2D/3D, AR/VR different tabs into different zones, containers which can be used to link and compare data, and be used to be put aside and used to find the closest answer you want in different zones. This will be at the client side, and on the server side will be in the cloud with superfast neuromorphic servers. The key to intelligent indexing is to link all types of files like eg videos and images by tagging with meta data, even stripping videos to frame by frame images and sound, and associate them to keywords, every types of files can be done this way, using AI and machine learning, to create a massive library of everything in the Next Gen Internet, which can be open or closed.

PS. I do not control the markets but let demand control the direction of technology, where present technology of intelligent indexing will create mass deployment of the Cloud and Big Data, different new types of browsers which I will design to merge for 2D/3D, VR/AR, Videos and even research, linking all kinds of searches with metadata with an new kind of indexing engine(spider) on intelligent databases and files, which will span the entire internet, both TCPIP and Blockchain, and I will ultimately merged everything together.

5. A Unified Encrypted 3D Database will be used which is backward compatible.

6. The world’s largest Bitcoin mining Datacentre on Neuromorphic computers to mine our own bitcoin. Once the benefits of mining bitcoin ends, I will take over and make it illegal for anyone else in the world to do it, and I will only do it for IMF/World Bank, printing any amounts of digital currency the world needs, but I will put back with Technologies and Innovations, to prevent a loss of confidence, effectively solving the crisis in the World Financial System, but the World must accept my terms first, only I know how to hack into Bitcoin, the World is not ready for it yet.

7. Link our platform to all the World’s Stock Exchanges which we will export our technologies on Next Generation Neuromorphic Datacenters so you can trade any assets or debts or commodities 24/7 365 days a year.

8. The old internet is supported by TCPIP, but the next gen Internet 3.0 is supported by Blockchain 3.0 with Matrix nodes that is based on ID and Mac Addresses. New switches will bridge the gap which will convert TCPIP to Blockchain 3.0 with Matrix nodes and vice versa and support even iOT devices that require AI. Intelligent NAT will update address from both TCPIP and Blockchain 3.0 via Routing Tables that is supported by most modern routers/modems once you connect to the internet.

9. So essentially 6G is a totally new decentralised network on Blockchain with backward compatibility to TCPIP.

10. So essentially Servers on the Cloud will exists on both networks, and you can use today’s devices to also access AI servers on the Cloud on Blockchain.

11. TCPIP networks require DNS servers but in a decentralised network, you are identified by your Matrix nodes, uniqued identifiers like a combination of Mac addresses

and IDs.

12. Another way will be using new technologies to create unique identifiers on Blockchain 3.0 that will not compromise your privacy but know where your country of origin.

13. Li-Fi will be widely used when 5G is adopted worldwide as a last link to the Internet where the electricity GRID is present in remote areas. Thru advances in compacting the cells in LED and maximising the spectrum, Li-Fi will achieve speeds similar to Fibre and 5G.

14. How will WiFi7 works in the next gen Internet? Present WiFi6 uses your connection to WiFi to remember your network and when it comes into range, it will connect seamlessly, however this feature is not available for Mobile network which is depending on your service provider. For WiFi7, the same seamless connection is available for both WiFi and Mobile where an AI alogorithm will determine which network is in range and connect automatically without manually switching networks, where tokens and new encryption keys will ensure it is unhackable unlike WPA2. A totally new spectrum will be used with transmission speeds beyond Li-Fi from today’s WiFi6 for 5G.

15. So what is the future implications of the Next Generation Internet? With 5G now we can create 2 different networks, 1 our existing TCPIP network and another our Blockchain network on Sandbox(Testing) where you can test every technology you want for pros and cons before we implement for the rollout of 6G. You do not need every country to be setup, Singapore is positioned to lead this venture as it has not implemented 5G until 2020, and the rest of the world can participate and share in this innovations. This is different from a traditional Sandbox as everything is Live and you will straightaway see the ecosystem of problems and correct it.

16. I will test out MindSpore ecosystem to see it’s image processing capabilities for 3D searches on Blockchain 3.0 and create all the missing technologies for intelligent searches on the Next Generation Internet.

17. I will modify the Blockchain 3.0 protocol to support Mesh networks for store and forward in case the Internet is down using technologies like Bridgefy.

To prove all my theories work I will setup a network with a static IP and create a DMZ zone to create Matrix nodes that does not require a DNS, DHCP server but very complex routing rules and NAT translations together with MAC addresses to control both incoming and outgoing traffic and run all kinds of protocols and services, alongside with IPv4 and IPv6, using blockchain 3.0 technology, which is encrypted and cannot be hacked, to test hundreds of scenerios using neuromorphic computers. It will be backward compatible to TCPIP and all you need to modify is intelligent routers, switches and nodes that support these two different networks once plug into the internet will auto update all the features to support this new standard.