how to get protection from DNS cache spoofing, DNS phishing,DNS Cache Snooping

Could anyone suggest me how to get protected from DNS cache Spoofing, Phishing, Snooping, I am the only one connected to the internet through a modem and I did not created any trusted network zone, my Os is Win7…?

any softwares or any technics to do that…?

Could anyone suggest me how to get protected from DNS cache Spoofing
You can use a more secure DNS then what your ISP is offering If you like to use comodo's dns here's how
1. Click the Start Orb, then select Control Panel. 2. Click on View network status and tasks. 3. Click on View Status. 4. Click the Properties button. 5. Vista may ask for your permission to make changes. If so, click the Continue button. 6. Select Internet Protocol Version 4 (TCP/IPv4), then click the Properties button. 7. Click the radio button Use the following DNS server addresses and type in in the Preferred DNS server and in the Alternate DNS server fields.
There's quite abit Comodo's solution for that is this ---> Comodo Dragon web browser has that built in with vengine

as for non-comodo solutions
You can learn more on detecting it by knowing what to look for (This site will give you some great advice)

You can download “WOT”

Download the WOT add-on

The WOT add-on is a safe surfing tool for your browser. Our traffic-light rating symbols show which websites you can trust for safe surfing, shopping and searching on the web.

* WOT is free and easy-to-use
* Our active community has rated millions of websites
* Ratings are updated every half hour
* Our trusted sources provide extra protection against phishing, spam and other Internet scams

*  Firefox
*  Google Chrome
*  Internet Explorer
*  Safari
*  Opera
*  Bookmarklet for others</blockquote>
That's kind of general (this site below has every category of snooping. Just go there and choose the catagory your intreasted in :-TU This is what this site has
General information
* Why is Cyber Security a Problem?
* Guidelines for Publishing Information Online
* Understanding Internet Service Providers (ISPs)

General security

* Choosing and Protecting Passwords
* Understanding Anti-Virus Software
* Understanding Firewalls
* Coordinating Virus and Spyware Defense
* Debunking Some Common Myths
* Good Security Habits
* Safeguarding Your Data
* Real-World Warnings Keep You Safe Online
* Keeping Children Safe Online

Attacks and threats

* Dealing with Cyberbullies
* Understanding Hidden Threats: Corrupted Software Files
* Understanding Hidden Threats: Rootkits and Botnets
* Preventing and Responding to Identity Theft
* Recovering from Viruses, Worms, and Trojan Horses
* Recognizing and Avoiding Spyware
* Avoiding Social Engineering and Phishing Attacks
* Understanding Denial-of-Service Attacks
* Identifying Hoaxes and Urban Legends
* Avoiding the Pitfalls of Online Trading

Email and communication

* Understanding Your Computer: Email Clients
* Using Caution with Email Attachments
* Reducing Spam
* Benefits and Risks of Free Email Services
* Benefits of Blind Carbon Copy (BCC)
* Understanding Digital Signatures
* Using Instant Messaging and Chat Rooms Safely
* Staying Safe on Social Network Sites

Mobile devices

* Protecting Portable Devices: Physical Security
* Protecting Portable Devices: Data Security
* Using Caution with USB Drives
* Securing Wireless Networks
* Cybersecurity for Electronic Devices
* Defending Cell Phones and PDAs Against Attack


* How Anonymous Are You?
* Protecting Your Privacy
* Understanding Encryption
* Effectively Erasing Files
* Supplementing Passwords

Safe browsing

* Understanding Your Computer: Web Browsers
* Evaluating Your Web Browser's Security Settings
* Shopping Safely Online
* Browsing Safely: Understanding Active Content and Cookies
* Understanding Web Site Certificates
* Understanding Internationalized Domain Names
* Understanding Bluetooth Technology
* Avoiding Copyright Infringement

Software and applications

* Understanding Patches
* Understanding Voice over Internet Protocol (VoIP)
* Risks of File-Sharing Technology
* Reviewing End-User License Agreements
* Understanding Your Computer: Operating Systems</blockquote>

Stay safe :■■■■

That DNS server address is for IPv4 only.
Is there an address to use with IPv6?

Not At The Moment;

Thus You’ll need to use the IPv4 Address

(IPv6 Can Read/Communicate IPv4) NOT Vice Versa;


A technique to prevent DNS spoofing is to only have DNS rules in the firewall that specify allowed IP addresses for the DNS servers. In the Comodo Firewall, I like to create a Network Zone called “Allowed DNS servers”. Then I edit the Predefined Policies rules for DNS to use “Allowed DNS servers” for the destination IP address.

Hi SilentMusic

could u please specify, how to do that (step by step)…I mean a good rule set…suppose my DNS servers are 192.x.y.z and 192.x1.y1.z1…?

Double-click the Comodo TaskBar icon > Firewall tab > Network Security Policy
Network Zones tab > Add > A new network zone… > type “Allowed DNS servers” > Apply
Right-click “Allowed DNS servers” in list on left > Add… > drop down “IPv4 single address” > 192.x.y.z > Apply
Right-click “Allowed DNS servers” in list on left > Add… > drop down “IPv4 single address” > 192.x1.y1.z1 > Apply
OK button at bottom right corner (apply changes, closes Network Security Policy menu)

Network Security Policy > Predefined Policies tab > Web Browser > Edit
Click “Allow Outgoing DNS Requests” > Edit
Highlight the entire Description text > press the Delete key on the keyboard
(Note: new Description text will be automatically generated upon completion, which indicates your customization)
Destination Address tab > Type = Network Zone > Zone = “Allowed DNS servers” > Apply > Apply
Repeat for the other Predefined Policies with DNS entries (Email Client, FTP Client)
OK button at bottom right corner (apply changes, closes Network Security Policy menu)