Featured Blogs

Latest

Independence and Security Online Have Not Yet Been Won

As we, here in the United States celebrate our independence this Fourth of July, we are reminded that the liberties and freedoms that come with that independence have yet to be won online. As citizens of this country we are blessed with safety and security from threats both foreign and domestic, but those guarantees have not yet extended to our citizenship in the global Internet community. This is true not just for American citizens, but for all Internet users throughout the world. more

Internet Security and the Multistakeholder Approach: Is It Attainable?

Internet Security is a topic that has drawn a lot of attention over the past year. As awareness grows that cooperation is necessary, it dawns on people that there are many and very different stakeholders involved, stakeholders that may never have met before. Let alone have cooperated. An example of an approach is the National Cyber Security Council (NCSC) that was installed in The Netherlands on 30 June. This is a high level council that will give advice to public as well as private entities on how to better secure themselves and society at large against cyber attacks and how to become more resilient. However, without the right approach it is doomed to become a talking shop. more

Email in the World’s Languages - Part I

Back when the Internet was young end servers came with shovels (for the coal), everyone on the net spoke English, and all the e-mail was in English. To represent text in a computer, each character needs to have a numeric code. The most common code set was (and is) ASCII, which is basically the codes used by the cheap, reliable Teletype printing terminals everyone used as their computer consoles. ASCII is a seven bit character code, code values 0 through 127, and it includes upper and lower case letters and a reasonable selection of punctuation adequate for written English. more

Role of Finance Leaders is Specialized in TLD Launches

When I first entered the domain industry as head of finance and operations at .MOBI, the company had just acquired its licence from ICANN. I did a quick overview of the business environment through a financial lens. My first impressions were predominantly positive. Sales were generated up front on a cash basis, which put registry operators in an enviable operational cash flow position... Outsourcing the back-end registry operations meant that we could tie cost of goods sold (COGS) to activity. But I had a steep learning curve... more

Bit.ly Gets You Blocked

URL shorteners, like bit.ly, moby.to and tinyurl.com, do three things... Making URLs shorter was their original role, and it's why they're so common in media where the raw URL is visible to the recipient -- instant messaging, twitter and other microblogs, and in plain text email where the "real" URL won't fit on a single line. From the moment they were invented they've been used to trick people to click on links to pages they'd rather not visit... more

What’s New In the Field of Cybersecurity Cooperation

The last few months have shown a number of signs that cooperation in cyberspace is not just necessary, but it is vital for the survival of the Internet as we know it. There is no need to provide links to all the articles and news stories that talk about the dangers of cyberattacks on the infrastructure in the USA or other countries - you can find plenty of them. ... What misses really in these stories is the answer to the question "So, what?" more

Outsourcing and Registry Operations Present Challenges to New TLD Applicants

After ICANN announced in Singapore approval of the new Top-Level Domain (TLD) program, we heard many prospective applicants say they would start asking registry infrastructure providers to break down their costs into registration and resolution components. The last few TLD launches have shown that although you can achieve some respectable registration volumes for new TLDs, chances are it will take some time for content to be associated with the domain names, and hence, resolutions to pick up. more

Catching Spam Email with Project Honey Pot

Since its launch in October, 2004 Project Honey Pot has made some interesting progress in their war against spam email. The project is a distributed system used to identify spammers and spambots operating across the Internet. To put it simply, Project Honey Pot lays millions of traps around the Internet (66,393,293 as of this writing) baited with specific email addresses that are configured to forward received emails to the Project Honey Pot system. Since these are not email addresses used by real individuals virtually every email received is positively identified as spam. more

New gTLDs: Floodgates for Spammers?

Ever since I heard of the new generic Top-Level Domains (gTLDs), I wondered whether they would be prone to abuse. For example, Microsoft might want to register www.microsoft.microsoft, or Sony might want to register www.sony. But isn't this opening up the floodgates for spammers to register their own domains and squat on them? Why couldn't a spammer register www.cit.ibank? They could then send phishing messages and fool people into clicking very legitimate looking domains. But I don't think this will be a problem. more

ICANN Voting to Pull the Weeds is Good - Pulling Them is Even Better

At the ICANN Public Forum in Singapore yesterday, I likened the ICANN to a community garden: fertile, colorful and above all, worthwhile, but not without a few troublesome weeds. Today's Board vote to adopt the recommendations of the Accountability and Transparency Review Team (ATRT) is a vote to pull those weeds. As good as voting for this weed-pulling exercise is, completing it will be even better. more

Internet’s New “Big Bang” Creates Chance to Put Down Roots

The Internet has done as much as the jet engine to shrink the distance between where we are and where we want to go. Even the propeller-type connectivity of dial-up was a giant leap forward. But as much as the technology has allowed us to go with ease to any place we choose - to learn, to be heard, to promote - equally powerful is the platform's ability to help us gather. The phenomena of social media services like LinkedIn and Facebook are present day proof of this human urge. more

Beyond Limitations and What Good It Would Do to ICANN to Operate from Abundance

The ICANN community is conservative. A considerable number of dedicated ICANN volunteers from various constituencies believe that ICANN should follow the unusual logic of limiting its revenues to the levels of its CURRENT estimates of expenditure. The Board, acting on the advise of the ICANN community brought down the ICANN transaction fee per domain name from 25 cents to 16 cents and in the case of numbers, for various reasons the Address Registry fees that it collects from the Regional Internet Registries have been historically kept at a negligibly low level. more

ATRT and the Dog That Didn’t Bark

A favorite Sherlock Holmes story has the detective unraveling the mystery of a murdered horse trainer and the theft of a prized thoroughbred by concentrating on the fact that a dog didn't bark in the night when the horse was stolen. This silence implied for Holmes that it was no stranger who entered the stall. From this he deduced that it was the trainer himself who had removed the horse to fix a race for his profit and that the horse had killed the trainer when he tried to cripple it. ICANN 41 has been afflicted by a similarly curious silence. more

The New gTLD Chess Game

On June 20th, the ICANN board voted to move ahead with the new generic Top-Level Domains (gTLDs) program, intended to add hundreds, if not thousands of new names to the DNS root. Now what? Not even the most enthusiastic ICANN supporters think that any new TLDs will be added before the end of 2012, but there are other things going on that greatly complicate the outlook. more

Aged Security Flaw Renews Open/Closed-Source Debate

The recent announcement of a 13-year old security flaw found in an Open Source security library has renewed the debate between open source and closed source software. The library, crypt_blowfish, allows for fast two-way password encryption. The flaw introduces the potential for passwords to be easily compromised and affects PHP and a number of Linux distributions that include the crypt_blowfish library. more

Topics

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days