Open In App

What is QUAD9 Technology

Last Updated : 22 May, 2020
Improve
Improve
Like Article
Like
Save
Share
Report

The QUAD9 is an emerging technology that provides free security service to protect users from accessing the overwhelming malware, botnet infrastructure, malicious domain servers, etc. Anchoring threat intelligence from multiple industry top companies. It is an effective and easy way to add an additional layer of security to your infrastructure for free. Currently, It blocks up to two million threats per day.

History

QUAD9 is basically developed due to unable to many of the DNS resolver hadn’t enough power to detect and remove the malicious activity associated with servers. It is a nonprofit organization developed by IBM security, in collaboration with Packet Clearing House (PCH), Global Cyber Alliance (GCA), and many other cybersecurity organizations for the purpose of operating a privacy-and-security-centric public DNS resolver.

QUAD9 Technology

How does QUAD9 works:

The QUAD9 security system has an ability by which a computer translates the IP addresses into readable websites. It has an extra layer of protection, by which the security configurations target for distributed denial of malware attacks. If the security system detects that site in which you want to access is malicious, it automatically blocks your system to reach on that particular site containing malicious information.

IP addresses in QUAD9

  • IPv4 address :
    9.9.9.9
    149.112.112.112
  • IPv6 address:
    2620:fe::fe
    2620:fe::9
  • Port Numbers
    DNS over TLS --> port 853
    DNS over HTTPS --> port 443
    DNSCrypt --> port 443
    

How to configure QUAD9

QUAD9 requires a simple configuration method by which you can make a change in your existed DNS service. For that, we have to apply a change in your DNS setting, by putting IP address “9.9.9.9” as depend on your IP address type.
The exact configuration will depend on your network configuration. Quad9 has provided detailed guidance on the installation through YouTube guides for both Mac OS and Windows.


Similar Reads

Virtual Reality Vs Immersive Technology
It’s time to learn Immersive technologies. This is mind-blowing technology which is revolutionizing at present This comprises of Virtual Reality, Augmented Reality, and Mixed Reality. Short notes on Virtual Reality : It is a computer generated simulation of alternate world or reality. The focus of virtual reality is on simulating the vision. Import
3 min read
Difference between 3G and 4G Technology
3G and 4G are often differentiated regarding technology compliance, information transfer rate, capacity, information processing design, variety of connections, etc. 3G stands for Third Generation within which optimized mobile square measure developed for sanctioning information and broadband services with the higher property. 4G LTE stands for Four
2 min read
Advancement in Technology of 5G
We cannot even think of our existence without the internet these days. The internet is doing us favors in various fields starting with health services to fun and entertainment. Today not a single bank, hospital, government, or corporate office can carry off their work without the help of internet services. A good internet service demands speed and
3 min read
What is E-paper Technology in Amazon’s Kindle?
Amazon is one of the most famous IT companies in the world. It had launched a product called Kindle (2007), aimed at book lovers who could now read several books with new technology. E-paper or Electronic paper, aka Electronic Ink Display (EID), is the representation of ink on paper with the use of technology. Unlike other similar technologies that
3 min read
Quantum Computing - The Computing Technology of Tomorrow
Quantum Computing is a subject that can boggle even the most genius minds!!! It deals with topics that are considered science fiction by normal people like parallel universes, multiverse theory, etc. In fact, it sounds more like the next Marvel Dr. Strange movie and less like an actual technology!!! But Quantum Computing is very real. It is a compu
8 min read
Night Vision Technology
Originally developed for the military use, night vision technology allows one to see in the dark. We humans have poor night-vision compared to many animal species. But now with proper equipment we can see a person standing far away on a moonless cloudy night ! Today in the 21st century we have come a long way in developing night vision technology s
2 min read
Advantages and disadvantages of Remote Communication Technology
Remote Communication could be a sort of information communication in which data is transmitted and gotten between two or more gadgets without any utilize of wire or cable. Remote communication is the exchange of data or control between two or more focuses that are not associated by an electrical conductor. The foremost common remote advances utiliz
2 min read
Hawk-Eye Technology
Hawk-Eye is the most ultra-modern tool employed in any sport. Hawk-Eye first made its name in Cricket Television broadcast, yet the brand has multiform into Tennis, Snooker and Coaching. It is currently developing a system for Football. Hawk-Eye is the only ball-tracking device to have passed stringent ITF testing measures. Hawk-Eye’s Cricket Syste
3 min read
What is Blue Eyes Technology?
A Blue eye innovation is planned for making computational machines that have perceptual and tangible capacities like those of human, utilizing non-prominent detecting technique, utilizing most present-day camcorders and amplifiers to recognize the client's activities using conferred tactile capacities which permits the machine/PC to comprehend what
3 min read
Difference between WiFi and 3G Technology
1. WifI Technology: Wireless Fidelity (WiFi) is wireless communication technology. It is used for Local Area Networks. Wifi transmits data at 2.4 GHz and 5 GHz radio frequencies which are more stable and higher as compared to 3G networks. Wifi is a less expensive technology and can be easily installed by installing a wireless LAN on any computer th
2 min read