{"version":"1.0","provider_name":"Dotcom-Monitor Tools Blog","provider_url":"https:\/\/www.dotcom-tools.com\/web-performance","author_name":"Matt Schmitz","author_url":"https:\/\/www.dotcom-tools.com\/web-performance\/author\/schmitzm\/","title":"DNS Security - Best Practices for Optimum Security","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"1bzorlo2RT\"><a href=\"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/\">DNS Security &#8211; Best Practices for Optimum Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.dotcom-tools.com\/web-performance\/dns-security\/embed\/#?secret=1bzorlo2RT\" width=\"600\" height=\"338\" title=\"&#8220;DNS Security &#8211; Best Practices for Optimum Security&#8221; &#8212; Dotcom-Monitor Tools Blog\" data-secret=\"1bzorlo2RT\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,l){\"use strict\";var e=!1,o=!1;if(l.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=0;o<n.length;o++)n[o].style.display=\"none\";for(o=0;o<i.length;o++)if(r=i[o],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=l.createElement(\"a\"),a=l.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,a.host===s.host)if(l.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=l.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.dotcom-tools.com\/web-performance\/wp-content\/uploads\/2018\/05\/DNS-Security-Best-Practices-for-Optimum-Security.jpg","thumbnail_width":900,"thumbnail_height":400,"description":"One of the most overlooked elements of security is DNS. This essential communication protocol, which stands for Domain Name System, manages IP addresses and name server pointers for domain names. Learn the best practices for DNS security optimization here."}