How-To

The DNS vulnerability: What you should know and do