As I spend a lot of time on Oak Island (not the one on television, the other one), I tend to notice some of those trivial things in life. For instance, when the tide is pretty close to all the way in, it probably is not going to come in much longer; rather, it is likely to start going back out soon. If you spend any time around clocks with pendulums, you might have noticed the same thing; the maximum point at which the pendulum swings is the point where it also begins swinging back. more
The ACPA and the UDRP provide two separate and distinct methods for resolving domain name disputes. Both alternatives have many critics and proponents, but the true value of each will ultimately be determined by how well each combats cyber-squatting. Separately, the UDRP and the ACPA will probably work well to defuse most of the cyber-squatting that is currently invading the Internet. If combined together the UDRP and the ACPA can be a cost saving and effective way to prevent cybersquatting... more
There are thousands of sites and services on the 'net that offer domain name whois lookup services. As of last night, many of them may have stopped working. Why? Many of them rely on fairly rudimentary software that parses the whois from Verisign (for .com and .net) and then relays the query to the registrar whois. The site or service then displays the whois output from the registrar's whois server to you. more
The Uniform Domain Name Dispute Resolution Policy (UDRP) has never required that a complainant own any trademark registrations to succeed in a domain name dispute, given that common law trademark rights (if properly established) are sufficient. But, as a pair of recent UDRP decisions reminds us, even some registrations are inadequate. The issue relates to the first element of every UDRP complaint, which requires the party seeking relief to prove that the "domain name is identical or confusingly similar to a trademark... more
Internet service in and around Mogadishu, Somalia suffered a crippling blow recently as the East African Submarine System (EASSy) cable, which provides service to the area, was cut by the anchor of a passing ship. The government of Somalia estimated that the impact of the submarine cable cut was US$10 million per day and detained the MSC Alice, the cargo vessel that reportedly caused the damage. more
The IETF published RFC8200 last week, which officially makes IPv6 an Internet Standard. While this move was a long time coming -- IPv6 has now reached about 20% deployment -- a more interesting question is: what has changed since RFC2460, which was a draft standard, was published in 2013? After all, the point of moving from the experimental to the draft standard to the internet standard states is to learn more about the protocol as it operates on the wire... more
Bill Sweetman from NameNinja has released a handy little guide to domain name pricing for startups. While the guide is aimed at businesses starting out, the information around domain name pricing is applicable to anyone who wants to either "upgrade" their online brand or launch a new one. The guide focusses primarily on .com domain names, but also mentions both ccTLDs, alternative domains and new gTLDs. more
The Qatar Crisis started with a targeted Poli-Cyber hack of an unprecedented nature. Its shockwaves and repercussions continue to alter political and business fortunes, directions and paradigms not only in the Gulf region but globally. Almost everyone around the world is now aware of the this crisis that started early June. By mid July a Washington Post report cited US intelligence officials that the UAE orchestrated hacking of Qatari government sites, sparking regional upheaval that started it all. more
In afternoon of 14th July, the China Academy of Information and Communication Technology (CAICT) and ICANN Beijing Engagement Center jointly held the ICANN 59 China Internet Community Readout Session. Mr. Zhang Ya, Deputy Director of Information and Communication Authority under the Ministry of Industry and Information Technology (MIIT), made his presence and gave opening remarks on the meeting. Over 40 representatives from the Cyberspace Administration, the Ministry of Foreign Affairs, domain name registries and registrars, industrial organizations, institutes and universities participated in the seminar. more
In September 2015, the free pool of IPv4 numbers available through the American Registry for Internet Numbers (ARIN) ran dry. In 2016, the IPv4 market was the only reliable source of IPv4 numbers, globally, and the pattern of activity changed dramatically. So far in 2017, we have seen the trends in the last half of 2016 continue. Throughout 2015, IPv4 transactions were trending steadily upward and the volume of transferred numbers had reached an all time high... more
Two Uniform Domain-Name Dispute-Resolution Policy (UDRP) decisions posted this month involved domain names registered 20 and 21 years ago, David Duchovny v. Alberta Hot Rods c/o Jeff Burgar, 21 years and Commonwealth Bank of Australia v. Registration Private, Domains By Proxy, 20 years. Complainants prevailed in both cases. The domain names stand out as being the oldest to have been found registered in bad faith, and transferred. more
The Uniform Rapid Suspension System (URS) is often described as a domain name dispute policy that applies to the new gTLDs. While that's true, the URS is actually broader than that. The URS (a quick and inexpensive policy that allows a trademark owner to obtain the temporary suspension of a domain name) applies to more than just the new gTLDs, that is, those top-level domains that are a part of ICANN's 2012 domain name expansion. more
If you've read my blogs in the past, you'll know that I'm really passionate about the benefits that .brands can deliver to organizations and their customers. We are now half way through 2017 which provides us with an opportunity to have a good hard look at the data and reflect on the last six months in the .brands space. Here is the punchline -- it's pretty damn impressive, and for a variety of reasons. more
If a national government wants to prevent certain kinds of Internet communication inside its borders, the costs can be extreme and success will never be more than partial. VPN and tunnel technologies will keep improving as long as there is demand, and filtering or blocking out every such technology will be a never-ending game of one-upmanship. Everyone knows and will always know that determined Internet users will find a way to get to what they want, but sometimes the symbolic message is more important than the operational results. more
Unless you have a team employing the latest proactive threat-hunting techniques, the stealthy Advanced Persistent Threat (APT) hiding in your network can pass by completely unnoticed. There are as many definitions of APT as experts writing about the topic, so let's boil it down to the simple essentials: APTs are usually implanted and maintained by a team of malicious actors with the intention of living long term in your network while extracting valuable private information. more
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byVerisign
Sponsored byCSC