Thursday 22 March 2018 photo 5/41
![]() ![]() ![]() |
bind 9.8 5 p2
=========> Download Link http://relaws.ru/49?keyword=bind-98-5-p2&charset=utf-8
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
Introduction BIND 9.8.5-P2 is the latest production release of BIND 9.8. This document summarizes changes from BIND 9.8.4 to BIND 9.8.5-P2. Please see the CHANGES file in the source code release for a complete list of all changes. Download The latest versions of BIND 9 software can always be found on our web site at. None, Remote, Low, Not required, None, None, Partial. named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query. 2, CVE-2016-8864 · 20, DoS. The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed. BIND9.8.5-P2.zip.sha1.asc 2013-07-26 20:30 487 [TXT] BIND9.8.5-P2.zip.sha256.asc 2013-07-26 20:30 487 [TXT] BIND9.8.5-P2.zip.sha512.asc 2013-07-26 20:30 487 [ ] CHANGES 2013-07-26 20:30 358K [TXT] RELEASE-NOTES-BIND-9.8.5-P2.txt 2013-07-26 20:30 15K [ ] bind-9.8.5-P2.tar.gz 2013-07-26 20:30 6.9M. [PARENTDIR], Parent Directory, -. [ ], bind-9.8.5P2-1.src.rpm, 2013-07-29 11:07, 6.9M. [ ], bind-9.8.5P2-1.x86_6..> 2013-07-29 11:07, 2.5M. [ ], bind-devel-9.8.5P2-1..> 2013-07-29 11:07, 1.5M. [ ], bind-libs-9.8.5P2-1...> 2013-07-29 11:07, 1.0M. [ ], bind-utils-9.8.5P2-1..> 2013-07-29 11:07, 191K. The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed. ISC Bind 9.10.2. ISC Bind 9.10. ISC Bind 9.9.11. ISC Bind 9.9.10. ISC Bind 9.9.8. ISC Bind 9.9.7. ISC Bind 9.9.5. ISC Bind 9.9.4. ISC Bind 9.8.8. ISC Bind 9.8... ISC Bind 9.8.5 Rc2 ISC Bind 9.8.5 Rc1 ISC Bind 9.8.5 P2 ISC Bind 9.8.5 P1 ISC Bind 9.8.5 B2 ISC Bind 9.8.5 B1 ISC Bind 9.8.5. ISC Bind 9.8.4-P2 The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a. http://www.zerodayinitiative.com/advisories/ZDI-13-210/ https://kb.isc.org/article/AA-01015 https://kb.isc.org/article/AA-01016/ http://ftp.isc.org/isc/bind9/9.8.5-P2/CHANGES http://ftp.isc.org/isc/bind9/9.9.3-P2/CHANGES http://www.dns-co.com/solutions/bind/ Solution : Upgrade to BIND version 9.9.3-S1-P1 / 9.9.3-P2 / 9.8.5-P2. ... 9.8.0 Release : 5.P2.fc15 URL : http://www.isc.org/products/BIND/ Summary : The Berkeley Internet Name Domain (BIND) DNS (Domain Name System) server Description : BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS. Vulnerability Reference(s) Affected releases BIND named crash via a crafted query CVE-2013-4854 9.9.3-P1 and prior 9.8.5-P1 and prior Recursive resolver crash. through RPZ query CVE-2012-5689 9.9.2-P2 and prior 9.8.4-P2 and prior BIND named denial of service flaw CVE-2012-5166 9.9.1-P3 and prior 9.8.3-P3 and. BIND (Berkeley Internet Name Domain) is an implementation of the DNS (domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses, and a resolver library (routines for applications to use when interfacing with DNS). A DNS server allows clients to name resources or. The affected products of Bind is as listed below: • Bind 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2. 4.0 Recommendations. 4.1 Upgrade to the patched release most closely related to your current version of BIND. • BIND 9 versions 9.9.10-P2. libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running. Upgrade to BIND version 9.9.3-S1-P1 / 9.9.3-P2 / 9.8.5-P2 or later, or apply the vendor-supplied patch. In the case of development branches, such as 9.8.6rc1 / 9.9.4rc1 / 9.9.4-S1rc1, no patch is currently available. Upgrade to BIND 9.8.4-P1 / 9.9.2-P1 or later. Alternatively, disable DNS64 functionality via. Default included version of BIND, by Linux distribuition CentOS 5.4 9.3.6-4 7 9.5.1-P2 Ubuntu 6.5 9.8.2-0 5.3 9.3.4-10 6 9.5.0-P2 13.10 9.9.3 6.4 9.8.2-0 5.2 9.3.4-6 5 9.4.2 13.04 9.9.2-P1 6.3 9.8.2-0 Mint OpenSuSE 12.10 9.8.1-P1 6.2 9.7.3-8 16 9.9.3 13.1 9.9.3P2 12.04 9.8.1-P1 6.1 9.7.3-2 15 9.9.2-P1 12.3 9.9.2P1 11.10. ISC Bind 9.8.1 B2 * ISC Bind 9.8.1 B1 * ISC Bind 9.8.2 RC2 * ISC Bind 9.8.2 RC1 * ISC Bind 9.8.2 B1 * ISC Bind 9.8.2 * ISC Bind 9.8.3 * ISC Bind 9.8.3 P4 * ISC Bind 9.8.3 P3 * ISC Bind 9.8.3 P2 * ISC Bind 9.8.3 P1 * ISC Bind 9.8.4 * ISC Bind 9.8.5 * ISC Bind 9.8.5 RC1 * ISC Bind 9.8.5 P2 * ISC Bind 9.8.5. db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and. Isc bind 9.7.5; Isc bind 9.7.6; Isc bind 9.7.7; Isc bind 9.8.0; Isc bind 9.8.1; Isc bind 9.8.2; Isc bind 9.8.3; Isc bind 9.8.4; Isc bind 9.8.5; Isc bind 9.8.6; Isc bind 9.9.0. ID, CVE-2013-4854. Summary, The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via. wheezy, 1:9.8.4.dfsg.P1-6+nmu2+deb7u10. wheezy (security), 1:9.8.4.dfsg.P1-6+nmu2+deb7u20. jessie, 1:9.9.5.dfsg-9+deb8u14. jessie (security). CVE-2016-2848, ISC BIND 9.1.0 through 9.8.4-P2 and 9.9.0 through 9.9.2-P2 allows .. CVE-2013-2266, libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before . ISC BIND has released updates at the following links: BIND 9.8.5-P2 · BIND 9.9.3-P2 BIND 9.9.3-S1-P1 (Subscription version customers can obtain software update by contacting the vendor support channel). CentOS packages can be updated using the up2date or yum command. FreeBSD releases ports. Security Alert (A17-06-07): Multiple Vulnerabilities in ISC BIND. Published on: 30 June. BIND 9.4.0 to 9.8.8; BIND 9.9.0 to 9.9.10-P1; BIND 9.10.0 to 9.10.5-P1; BIND 9.11.0 to 9.11.1-P1; BIND 9.9.3-S1 to 9.9.10-S2; BIND 9.10.5-S1 to 9.10.5-S2. BIND 9.9.10-P2, 9.10.5-P2 and 9.11.1-P2; BIND 9.9.10-S3; BIND 9.10.5-S3. News: Critical Alert: BIND TKEY Vulnerability Affecting Linux Systems Running BIND DNS Server - CVE-2015-5477. Published: 05/08/2015 Back. Critical. BIND version 9.1.0 -> 9.8.x, 9.9.0->9.9.7-P1, 9.10.0->9.10.2-P2 How To Check If Affected. Ubuntu 14.04 LTS: bind9 1:9.9.5.dfsg-3ubuntu0.4. Ubuntu 12.04 LTS: bind9. 9.7.5. 9.7.6-P3. 9.7.7. 9.8.0-P2. 9.8.0-P4. 9.8.1. 9.8.1-P1. 9.8.1b3. 9.8.2rc1-RedHat-9.8.2-0.10.rc1.el6_3.6. 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.4.. Bind X.X.X. Binero DNS ns01-01. Blacknight's Super Duper DNS Of Doom. Bourbon. CHAOS is versionless. CHAOS is versionless. CIRA London nameserver. The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a. 脆弱性の解消 - 修正プログラムの適用 -. BIND を提供している ISC または各ベンダの修正プログラムを適用してください。ISC から以下のバージョンのパッチが提供されています。オープンソース版は http://www.isc.org/downloads/ よりダウンロードできます。 ISC BIND. * BIND 9.8.5-P2 * BIND 9.9.3-P2 * BIND 9.9.3-S1-P1. Description: BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server. Description: BIND (Berkeley Internet Name Domain) is an implementation of the DNS (Domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server. 如何修改bind-9.8.5-P2 支持edns-client-subnet ? 关注者. 6. 被浏览. 1,000. 关注问题 写回答. 添加评论. 分享. 邀请回答. . 查看全部2 个回答 · 八戒DNS. 免费智能DNS解析http://8jdns.com. 1 人赞同了该回答. 网上有资料,支持edns-client-subnet 比较容易的,下载个diff文件,可以自己修改的. Touching The Void. 1,修改解包逻辑; 2,用opt中带过来的ip地址替换clientIP; 3,用被替换过的clientIP进行查询逻辑 4,修改封包逻辑. 涉及到的主要文件有:message.c和client.c. 发布于2013-12-20. 0 1 条评论. 分享. 收藏 感谢. 写回答. QR Code of Downloading Zhihu App. 下载知乎客户端. 与世界分享知识、经验和见解. 如何修改bind-9.8.5-P2 支持edns-client-subnet. 磞啰. 我有更好的答案. 2017-08-04. 最佳答案. 1,修改解包逻辑; 2,用opt中带过来的ip地址替换clientIP; 3,用被替换过的clientIP进行查询逻辑 4,修改封包逻辑涉及到的主要文件有:message.c和client.c. 本回答由提问者推荐. 答案纠错 | 评论. 嫡妍慧. 采纳率:92% 来自团队:百度与你. bind-9.8.3-P3.el6.x86_64/ 2012-09-14 09:51 - [DIR] bind-9.8.4-0.el6.x86_64/ 2012-10-14 14:26 - [DIR] bind-9.8.4-P1.el6.x86_64/ 2012-12-11 20:59 - [DIR] bind-9.8.4-P2.el6.x86_64/ 2013-03-27 22:19 - [DIR] bind-9.8.5-P1.el6.x86_64/ 2013-06-19 11:05 - [DIR] bind-9.8.5-P2.el6.x86_64/ 2013-07-27 20:13 - [DIR]. The flaw affects all actively developed and supported versions prior to and resolved with today's release of BIND 9.3.6-P1, 9.4.3-P1, 9.5.0-P2(-W2), 9.5.1-P1 and.... Versions affected: Open source: 9.7.0->9.7.7, 9.8.0->9.8.5-P1, 9.9.0->9.9.3-P1, 9.8.6b1 and 9.9.4b1; Subscription: 9.9.3-S1 and 9.9.4-S1b1 2013-11-07 BIND 9.9.4-P1 Release (http://ftp.isc.org/isc/bind9/9.9.4-P1/bind-9.9.4-P1.tar.gz); 2013-11-07 BIND 9.8.6-P1 Release (http://ftp.isc.org/isc/bind9/9.8.6-P1/bind-9.8.6-P1.tar.gz). 2013-07-27 BIND 9.9.3-P2 Release (http://ftp.isc.org/isc/bind9/9.9.3-P2/bind-9.9.3-P2.tar.gz); 2013-07-27 BIND 9.8.5-P2 Release. Download bind packages for ALTLinux, Arch Linux, CentOS, Fedora, Mageia, OpenMandriva, openSUSE, PCLinuxOS, ROSA, Slackware. CVE-2013-4854, The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a. BIND, 9.9.10-P3, 9.9.9-P8, 9.9.8-P3, 9.9.5, 9.9.9-P5, 9.9.8-P3, 9.9.6-P2, 9.9.6-P1, 9.9.3-P2, 9.9.3-P2, 9.8.5-P2, 9.8.4-P2, 9.8.3-P4, 9.8.3-P2, 9.8.1-P1, 9.7.3-P3, 9.7.3-P3. Java, 1.7.0_131, 1.7.0_131, 1.7.0_55, 1.7.0_55, 1.7.0_131, 1.7.0_55, 1.7.0_45, 1.7.0_45, 1.7.0_45, 1.7.0_45, 1.6.0_41, 1.6.0_41, 1.6. Below are results of the standard things that I should do. I added forwarders, which didn't help.. Below are some outputs. badib.biz is a local domain, and dig & nslookup works, but gives error for external domains. [root@ns2 named]# dig @localhost badib.biz ; > DiG 9.8.5-P2 > @localhost badib.biz BIND 9.2.6-P2 through 9.2.9, 9.3.2-P1 through 9.3.6, 9.4.0 through 9.8.8, 9.9.0 through 9.9.10, 9.10.0 through 9.10.5, 9.11.0 through 9.11.1, 9.9.3-S1 through 9.9.10-S1, and 9.10.5-S1 are affected by a vulnerability, which could allow a local user to achieve privilege escalation if the host file system permissions allow this. Versions that address these vulnerabilities are as follows: ISC BIND - BIND 9 version 9.9.10-P2 - BIND 9 version 9.10.5-P2 - BIND 9 version 9.11.1-P2 IV. Workaround According to ISC, the effects of this vulnerability can be mitigated by applying the following workarounds. - Use Access Control List (ACL). bind-9.8.1-P1.tar.gz, 2011-11-18 18:46, 8.1M. [ ], bind-9.9.0.tar.gz, 2012-05-28 15:51, 6.8M. [ ], bind-9.9.1-P2.tar.. bind-9.9.3-P2-use_iproute2-1.patch, 2013-07-30 08:20, 1.2K. [ ], bind-9.9.3-P2.tar.gz, 2013-07-30 14:53, 7.1M. bind-9.9.5.tar.gz, 2014-02-13 21:30, 7.4M. [ ], bind-9.10.0-P2-use_iproute2-1.patch, 2014-06-14. unspecified combinations of resource records. 3.1.6. ISC BIND: A specially crafted query can cause BIND to terminate abnormally (CVE-2013-4854) (dns-bind-cve- 2013-4854) Description: The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2,. Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote. isc bind 9.2.4; isc bind 9.2.5; isc bind 9.2.6; isc bind 9.2.7; isc bind 9.3; isc bind 9.3.0; isc bind 9.3.1; isc bind 9.3.2; isc bind 9.3.3; isc bind 9.4; isc bind 9.4-esv. The search engine for Linux rpm and Debian packages. Release Date: 2008 . 07 . 23. Title: bailiwicked_domain.rb. Description: Kaminsky DNS Cache Poisoning Flaw Exploit for Domains. Tested: BIND 9 . 4 . 1 - 9 .... lport = nil. 1 .upto( 5 ) do |i|. req = Resolv:: DNS ::Message. new. txt = "spoofprobe-check-#{i}-#{$$}#{(rand()*1000000).to_i}.red.metasploit.com". ... authentication and perform unauthorized zone transfers. Remediation. The vulnerability is addressed in the following versions: 9.9.10-P2, 9.10.5-P2, 9.11.1-P2, 9.9.10-S3, 9.10.5-S3. External links. https://kb.isc.org/article/AA-01504/74/CVE-2017-3142%3A-An-error-in-TSIG-authentication-can-permit-u. All members of the Gαq subfamily activate the beta isoform of phosphoinositide-specific phospholipase C, which cleaves PI(4,5)P2 to produce DAG and Ins(1,4,5)P3. Ins(1,4,5)P3 is. This assay utilizes a P1-inositol phosphate probe to bind a specific inositol phosphate-binding protein (IPBP). A GST-modified PH domain. The phosphatidylinositides exist with modifications at the 3, 4, and 5 position to generate a family of seven lipids, [PI3P, PI4P, PI5P, PI(3,4)P2, PI(4,5)P2, PI(3,5)P2, and PI(3,4,5)P3] lipids that mediate important structural or enzymatic effects. They bind to specific protein binding domains to regulate vesicular traffic and. This problem is still present with : 32:bind-9.8.2-0.10.rc1.el6_3.2.x86_64 > on CentOs 6.3, on two different servers > > I solved the problem by means of : > > chown -R named.named /var/named/chroot > > restorecon -R /var/named/chroot/. That helps for bind-9.9.1-5.P2.fc17.x86_64 in Fedora 17. My custom. BINDサポート、BIND保守、BIND保守サポート、BIND関連サービスに関する特設サイトです。 Vulnerabilidad en named en ISC BIND (CVE-2015-1349). Tipo:. named en ISC BIND 9.7.0 hasta 9.9.6 anterior a 9.9.6-P2 y 9.10.x anterior a 9.10.1-P2, cuando la característica de la validación DNSSEC y de las claves. Isc Bind 9.9.7 B1; Isc Bind 9.9.6 P1; Isc Bind 9.9.6; Isc Bind 9.9.5; Isc Bind 9.9.4 B1. BIND 9.7.x; BIND 9.8.5-P2 未満の 9.8.x; BIND 9.8.6b1; BIND 9.9.3-P2 未満の 9.9.x; BIND 9.9.4b1; DNSco BIND 9.9.3-S1-P1 未満の 9.9.3-S1; DNSco BIND 9.9.4-S1b1. アップル. OS X Server 4.0 未満 (OS X Yosemite v10.10 以降). 想定される影響. 第三者により、ログメッセージを構成中に適切に処理されない不正な. BIND 9.4.0 ~ 9.8.8, 9.9.0 ~ 9.9.10-P1, 9.10.0 ~ 9.10.5-P1, 9.11.0 ~ 9.11.1-P1, 9.9.3-S1 ~ 9.9.10-S2, 9.10.5-S1 ~ 9.10.5-S2 □ 해결 방안 o BIND 버전 업그레이드를 통한 조치 - BIND 9.9.10-P2, 9.10.5-P2, 9.11.1-P2, 9.9.10-S3, 9.10.5-S3로 업그레이드 o 설정에 의한 조치 - BIND의 접근제어 설정 시 TSIG 인증과. The impact of doing this is explained in a separate ISC article that also answers other frequently asked questions about the vulnerability. The organization also released BIND versions 9.8.4-P2 and 9.9.2-P2, which have regular expression support disabled by default. BIND 9.7.x is no longer supported and. Afectan a las versiones 9.4.0 a 9.8.8, 9.9.0 a 9.9.10-P1, 9.10.0 a 9.10.5-P1, 9.11.0 a 9.11.1-P1, 9.9.3-S1 a 9.9.10-S2 y 9.10.5-S1 a 9.10.5-S2. Hace 15 días también. vulnerabilidades. Se recomienda actualizar a las versiones más recientes BIND 9 versión 9.9.10-P2, 9.10.5-P2 y 9.11.1-P2, disponibles en:. P2.el5_7.4 1384 Windoze $2.99 1383 [Secure] 1382 Who knows? 1380 n/a 1363 BIND 9.9.2-P3 1361 42 1357 there are no version 1356 Go Away 1340 version timed out 1334 dns 1331 unbound 1.4.11 1302 dontdoit 1300 9.3.2-P1 1294 9.6.2-P2-RedHat-9.6.2-5.P2.fc12 1290 9.6.2-P2-RedHat-9.6.2-4. Despite the structural and functional similarity, the ENTH and ANTH domains bind PtdIns(4,5)P2 in a different manner.. Thus the ENTH domain exhibited a 9.8 nM affinity for POPC/POPE/PtdIns(4,5)P2 vesicles at pH 6.0, however this interaction was 8-fold weaker at pH 7.4 and 34-fold weaker at pH 8.0. Multiprocessor Support BIND 9.9 includes a number of changes from BIND 9.8 and earlier releases, including: NXDOMAIN redirection Improved startup and reconfiguration time, especially with large numbers of authoritative zones New "inline-signing" option, allows named to sign zones completely. all, How do i safely upgrade from BIND 9.8.2rc1 to 9.9.7-P2 ?running "yum update bind" i get the following "This system is regi... | 4 replies | General Linux. Version Distribution of BIND 9.x 8 Latest Versions: 9.9.3- P2 9.8.5-P2 9.7.7 (EOL) 9.6-ESV-R9-P1; 9. 1st-to-3rd Level Domain Distribution of Open Resolver 9; 10. Spammer Favored Domains 10 n Spamology: A Study of Spam Origins, Craig et.al., CEAS 2009 n TOP 2 origins of spam mail n hinet.net.
Annons