With the patch for the DNS exploit (US-CERT’s Vulnerability Note VU#800113 ) being rolled out, The Register reports of users being redirected to fake google sites.
At the end of the article there are two test sites. I tried both tests and both had good news. The Uni.’s domains check out to have a GREAT (in green) source port randomness and GREAT transaction ID randomness.
At least I won’t be getting any dodgy ad-based obscene material in my searches for journal articles and conference papers.
Don’t forget to test your ISP: https://www.dns-oarc.net/oarc/services/dnsentropy , Keep an eye out if they are vulnerable and tell us the results.
Update: Sure you could change your DNS entry and have your requests directed to OpenDNS. That is up to you, and how paranoid you are.
 theregister.co.uk – Black hats attack gaping DNS hole
 DNS-OARC – Web-based DNS Randomness Test
 US-CERT’s Vulnerability Note VU#800113 – http://www.kb.cert.org/vuls/id/800113