For those that don't know how to do it, here's the method for BIND:
First declare the zone in your config file:
zone "best-online-casino-directory.com" {
type master;
file "db.spammer";
allow-update { none; };
allow-transfer { none; };
}
Then build your zone file:
$TTL 86400
@ IN SOA @ you.yourdomain.com (
2004011401; serial
3H; refresh
15M; retry
1W; expiry
1D ); mim TTL
;
; ## Poison MX Records ##
@ IN MX 10 localhost
; ## Poison A Records ##
* IN A 65.174.230.39
Restart your DNS service and that's it. Anyone who queries your DNS server will not get the site they're expecting. (Hint: you may want to be careful using those IP addresses. Point a browser at them first.)
Oh! And be careful using this method if you sell service to general users. I'm able to use this method because of the existance of a security policy that says "no porn/no gambling from your workstation".
Mr. Gage of 1401-C Skyridge Dr, Crystal Lake, IL: pay the advertising charges I have posted on the front page of my blog and I'll re-enable the domain for the 35,000+ users my servers resolve for. Otherwise you become the 21,453rd poisoned domain in the server.
No comments:
Post a Comment