Featured Blogs

Latest

eco: 100K PCs Cleaned Through Anti-Botnet Center

eco, the German ISP association, mentions on its website today that the 100,000th PC was cleaned from infection through its PC cleaning program. Since 15 September, German account holders could visit the website to download tools to clean up computers from digital infections. Botfrei ("botfree", translation WdN) is a cooperation between eco and the German government. First figures seem to prove that this is a successful public-private partnership, worth looking into for other countries as a best practice. more

Cyber Crime: It’s All About Data (Part 2)

In this part I want to focus on the gathering of cyber crime data. Are there best practices in the world on how cyber crime data is reported to law enforcement and aggregated to show the impact of said crime? Previously the discussion focused on the fact that cyber crime = crime and on a basic cyber (crime) training for every police officer. From the reactions this received, it is clear that some people see this as a possible solution. more

Tough Questions for ATRT

Public comments on the Proposed Recommendations published by the Accountability and Transparency Review Team ("ATRT") have now been submitted, and it is worth stepping back to evaluate ATRT's work in the context of ICANN's larger challenges. ATRT was constituted to carry out ICANN's commitments under the AoC. Yet at times ICANN acted as if ATRT were an adversary rather than a partner... more

The Trouble With 6to4

In the transition from IPv4 to IPv6, the preferred solution for network endpoints is to have both native IPv4 and IPv6 connectivity (also called dual-stack connectivity). If a site cannot get native IPv6 connectivity, however, the IPv4 network endpoints can choose from a number of conversion technologies to connect to the IPv6 Internet. The most commonly used conversion mechanisms are 6to4, Teredo and tunnel-brokers. At recent RIPE meetings there have been claims that 6to4 connectivity is quite often broken. We were interested to find out how broken it really is. more

Google as DNS, Wikileaks as PoC

Wikileaks is still accessible -- via Google. Does that change anything? For many Internet users IP addresses as well as domain names are completely transparent. Further, Google (and other search engines) and often the first stop when these users wants to find a service, or a web site. Thus, many of us discussed over the years the eventual viability of Google (... and other search engines) as "DNS" (note the "'s). Now, don't jump at my throat quite yet... more

ICANN’s Governance Conundrum

After reading Steve Delbianco's recent CircleID article entitled The Tale of Two Governance Models I was torn. On one hand I agreed and supported Steve's comments about the strength of the bottom-up consensus driven model upon which ICANN was originally founded. As I am about to begin my thirty fifth ICANN regional meeting over the last eleven years, it is a model which I still believe in and fiercely fight to defend. However, on the other hand I look back over the last eleven years... more

Do-Not-Track: Still Not a Great Idea

Back in August, FTC chair Jon Leibowitz suggested an Internet do-not-track registry, analogous to the telephone do-not-call registry. At the time, I thought it wasn't a good idea for both technical and non-technical reasons. This week, the FTC published an online privacy report recommending the same thing, and Rep. Ed Markey promises to offer a bill next year to mandate do-not-track for children. With all this interest, might it be a good idea now? Maybe. more

Two Years Later Dozens of Registrars Still in the Shadows

In June of 2008 KnujOn reported that 70 Registrars did not have a business address listed in the InterNIC Registrar Directory. Only after reporting a month later that little had changed did ICANN perform a mass update of the directory. On further inspection we found many of the newly disclosed addresses were phantom locations, false addresses, and PO boxes. more

WikiLeaks and Stuxnet - Smart Grid Wakeup Calls

The past couple of weeks have been pretty seminal for anyone concerned about the state of Internet security and the bigger picture as to how much we could - do - and should - trust the Web. These two strange words - WikiLeaks and Stuxnet - have suddenly entered our lexicon and there is a lot to be concerned about in the world of smart grid. more

US Government Waves the Caution Flag at ICANN

This month, ICANN is driving hard to get two of its horses to the finish line. The first is barely a year old - it's the first formal review of ICANN's accountability and transparency. The second horse is going on 4 years old: ICANN's plan to introduce hundreds of new top-level domains (TLDs) for the Internet. Just as these horses have entered the home stretch, one of the racecourse officials is vigorously waving the yellow caution flag. And ICANN would do well to pull back on the reins. more

Wildcarding Subdomains Is OK; Reverse Domain Name Hijacking Isn’t - Goforit v. Digimedia

This is a super-interesting dispute involving two not-so-interesting litigants. The plaintiff Goforit runs a type of meta-search engine at goforit.com. After spending 5 minutes at the site, I couldn't identify a single reason why anyone would want to use it. Also inexplicably, Goforit appears to be quite pleased with its trademark rights in "Goforit," a term that seems more like an exhortation than a trademark. more

How to Discredit Net Neutrality

On Tuesday (November 30) Internet backbone provider Level3 publicly accused cable-based ISP Comcast of trying to thwart competing video services delivered through the internet. Comcast was, according to Level3, suddenly choosing to charge it more because of its carriage of Netflix traffic. The accusation was consciously framed to raise net neutrality alarms. It appeared as if a cable TV giant was using its control of internet access to make access to a competing, over the top video service more expensive... Then the full story came out. more

Legal Threats Should Not Diminish ICANN’s Resolve

Guidebook for all interested parties. The best way to start this process would be to give conditional approval to the proposed final AGB next week. This may in fact involve acquiescing to the specific requests placed before it by litigious special interests, but those requests should be granted because they are reasonable and in the best interests of the program and its participants and stakeholders, not because ICANN feels it has to cave at the first sign of a gTLD opponent lawyering up. more

Remembering the Good Times

The most effective early email-borne viruses didn't need botnets. They didn't change your computer settings, or steal your login credentials. And they somehow convinced regular users to help them spread. The first warnings about the Good Times virus began to appear in November of 1994, and by December the warnings were seen all over as people did what the warning said, and forwarded it to all their friends. There was another outbreak the following March... more

The Ultimate Differentiator: Reliability!

Every company that monitors their site or application performance focuses on two key metrics Availability and Speed. However, there is a third metric, Reliability, which is often misunderstood or in some cases ignored by companies. Reliability measures availability, accuracy, and delivery of a service within a time threshold. Reliability is difficult to define and measure as it is different for each company and service. To simplify it, you can think of Reliability as how consistent are you in delivering the "service". more

Topics

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days