Phishing is when bad guys try to impersonate a trusted organization, so they can steal your credentials. Typically they'll send you a fake e-mail that appears to be from a bank, with a link to a fake website that also looks like the bank. Malware offers another more insidious way to steal your credentials, by running unwanted code on your computer... I like VeriSign's characterization of this kind of malware as an insecure endpoint, the PC which is the endpoint of the conversation with the bank isn't actually under the control of the person who's using it. more
Internet connectivity is a good thing. Many of us depend on it for everything from our livelihoods to our entertainment. However, the Internet is very fragile and even the The New York Times is worried about it. But they're primarily concerned with overloads that can occur when everyone on the planet does the same thing at roughly the same time, such as surfing for news about Michael Jackson. Unfortunately, we will never avoid all such scenarios. Physical systems are designed around average and typical peak loads, not around extremely high loads associated with very unlikely events. Who would pay for that? more
I outline the implications for value presented by ICANN's proposed introduction of new Top-Level Domains (TLDs) on user search and navigation, companies, and registries... For the new tools to be value adding they should facilitate navigation, reduce search cost, or provide actionable branding information through marketing. Unfortunately, the new TLDs bring in a mixed bag of value-adding and -destroying tools. more
Peer to peer download services are still popular with music-loving kids, it seems. The second annual survey of young people's music consumption by pressure group UK Music found that three-fifths of the 1,808 18-24 year olds who took part said they used p2p services, and four-fifths of those did so at least once a week. This is almost the same as last year's result, and would seem to indicate that the efforts by the music industry to offer a range of licensed alternatives to Limewire and other p2p services have failed to have any real impact. more
The FCC has run three days of workshops on the National Broadband Plan now, for the purpose of bringing a diverse set of perspectives on broadband technology and deployment issues to the attention of FCC staff. You can see the workshop agendas here. The collection of speakers is indeed very diverse. As you would expect, the session on eGov featured a number of government people and a larger collection of folks from the non-profit sector, all but one of whom has a distinctly left-of-center orientation. Grass-roots devolution arguments have a leftish and populist flavor, so who better to make the argument than people from left-of-center think tanks? more
My local area code (814) is running out of phone numbers. When discussing IPv6 with non-technical folks, I frequently use the hypothetical scenario of running out of phone numbers as an analogy for IPv4 address depletion. The conversation usually goes like this: "Imagine if we were running out of phone numbers. One way of solving that problem would be to make them bigger. Instead of ten digits, what if we made then thirty digits? If we did that, how many other things would we have to change? Some mundane things like business cards, letterhead, and phone books. But also more substantial things..." more
I recently learned about a meeting that took place between ICANN staff and Noncommercial Users Constituency (NCUC) members Kathy Kleiman and Konstantinos Komaitis regarding the Implementation Recommendations Team (IRT) recommendations for the protection of intellectual property rights in new generic Top-Level Domains (gTLDs). My comment relates to the White Paper published by Ms. Kleiman and Mr. Komaitis with respect to the notion of having multiple Regional Trademark clearinghouses (TMCs). For the reasons stated in this comment, the KK Proposal fails a number of the benchmarking checklists used by the IRT in evaluating proposals. more
The new Top-Level Domain (TLD) process is occupying a lot of people in the domain name industry at present. While some people are obviously very much against the entire concept of new TLDs, there are plenty of people and organisations who support the project. But what happens when you have more than one organisation vying for the same namespace? ...Seemingly the competition between two rival bids for .eco (doteco) has been getting more than a little dirty in the past few weeks. more
The recent row between Google, Apple and AT&T concerning the removal of Google Voice from the Apple iPhone store highlights the friction existing between network operators and so-called over the top (OTT) application providers. Most observers believe that AT&T initiated the blockade because Google Voice (which offers free or highly discounted calling rates) is a direct threat to AT&Ts call revenue (Google Voice users need only pay AT&T for access to the Internet). more
As we all know by now, last week, on Thursday, August 7, Twitter was hit with a denial-of-service attack that took it down for several hours. Other social networking sites like Facebook, LiveJournal, Youtube and Blogger were also hit. They managed to repel the attack although Facebook was not quite as successful as the other larger players. The theory floating about at the moment is that this was a politically oriented play designed to target one guy: a blogger. We are nearing the 1-year anniversary of a the Russian/Georgian 2008 war. There is a pro-Georgian blogger by the username of "Cyxymu" who had accounts on all of these services. more
It's getting so hard to find a decent .COM domain name that a big weed patch of businesses has grown up hawking really terrible names for enormous prices -- and they're finding buyers. They're catering to people who are just trying to find something -- anything! -- that will work for their new web site. The problem is especially acute for those who are trying to start a business. more
In January 2009 the US Congress began considering the American Recovery and Reinvestment Bill 2009 aimed at kick-starting an economy in deep recession. The package, passed into law on 17 February, comprised $787 billion of mainly tax cuts, unemployment benefits and spending in education, health care, infrastructure and energy. Included in the fiscal stimulus package was a relatively modest $7.2 billion for broadband and wireless in unserved and underserved areas... more
ICANN has announced that three more domain name registrars have lost their accreditation due to non-compliance with the RAA. The three registrars have been informed that their agreements with ICANN will not be renewed. South American Domains (NameFrog), Simply Named and Tahoe Domains have been sent letters by ICANN outlining the decision and the reasons for it. So what now? more
In a discussion about a recent denial of service attack against Twitter, someone asked, "Some class of suppliers must be making money off of the weaknesses. Anybody out there have a prescription for the cure?" Sure, but you're not going to like it. The Internet was originally a walled garden, where its operators knew who all the users were and could eject anyone who misbehaved... more
When CAN-SPAM was passed in 2003, it was fairly clear that Congress wasn't trying to enable broad private enforcement. Everyone knew that rabid anti-spammers would seize any new statutory right for a litigation frenzy... Although I personally think Congress would better served all of us by omitting all private enforcement rights in CAN-SPAM, unquestionably the private rights in CAN-SPAM are drafted narrowly to prevent their abuses. That hasn't stopped some zealous anti-spammers from testing the limits of CAN-SPAM's private enforcement remedies anyway. more
Sponsored byRadix
Sponsored byDNIB.com
Sponsored byWhoisXML API
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byVerisign
Sponsored byVerisign