Traditionally late with new-years wishes.
Kaminsky asked more than 3 million DNS servers across the net whether they knew the addresses associated with the Sony rootkit — connected.sonymusic.com, updates.xcp-aurora.com and license.suncom2.com. He uses a "non-recursive DNS query" that allows him to peek into a server’s cache and find out if anyone else has asked that particular machine for those addresses recently.