The World Intellectual Property Organization (WIPO) asserted on Monday that new gTLDs from ICANN would unleash a global crime wave. This dire warning was bolstered by an astonishing statistic: a whopping eight per cent (8%) increase in UDRP complaints from 2007 to 2008! But WIPO's press release tells only a very little of the truth. Astonishingly, the UDRP system actually works pretty well... more
The DNSSEC Industry Coalition conducted its first face to face meeting on Friday, March 13, 2009 at Google's Washington, DC office. Google's fun filled meeting room was packed with organizations that share a keen interest in DNS Security through the implementation of DNSSEC. more
The World Intellectual Property Organization put out a release yesterday trumpeting an eight percent increase in domain name disputes handled by WIPO. In 2008 there were 2329 complaints filed with WIPO, the most ever. WIPO uses the increase to raise questions about the possible increase in the number of available generic top-level domains... more
It's coming up on two years since the DomainKeys Identified Mail (DKIM) standard was published. While we're seeing a certain amount of signed mail from Google, Paypal, and ESPs, there's still a long way to go. How hard is it to sign your mail with DKIM? The major hurdle might seem to be getting mail software that can sign outgoing mail. more
Last year, MAAWG published a white paper titled Trust in Email Begins with Authentication [PDF], which explains that authentication (DKIM) is “[a] safe means of identifying a participant-such as an author or an operator of an email service” while reputation is a “means of assessing their trustworthiness.”
moreIt has been beaten, butted, and batted around quite a bit in the past few weeks -- let's look at a rough timeline of political issues which bring me to this point. Let's look at the power struggle (I prefer to call it confusion) in the U.S. Government with regards to "Cyber Security" -- in a nutshell. In the latter part of 2008, the U.S. House of Representatives Homeland Security Committee determined that DHS was not capable of providing proper critical infrastructure protection (and other Cyber protection capabilities) due to a number of issues. This may well be a political maneuver, or it may well actually have merit. more
When I was employed, I ran my own mail server and my own BlackBerry Enterprise Server, and I had things tuned pretty much exactly as I wanted them. My incoming mail got some custom processing that looked the sender's address up in my address book and assigned the message a category... I was a very happy email user. Now that I'm on my own, I've decided not to run my own server and all that software, and I've switched to Gmail and the T-Mobile BlackBerry server... Surprisingly, though, I'm mostly still happy... more
Traceroute is a network tool that helps determine the path packets take as they travel from one location to another, identifying all of the "hops" along the way. I wonder why they are called hops*? Almost all operating systems have traceroute utilities built in. The command is just that "traceroute", Windows systems abbreviate the command as "tracert" to deal with the 8.3 file naming convention of old... So, let's look at what information traceroute gives you. more
The penny dropped when I started looking at cloud computing as a service rather than a new technology. In that respect it is more like Google search and a DotCom development than a set of software and hardware tools. That was what I needed to get a better strategic grip on this new concept. As with all services, business strategies are key here, rather than technologies. As soon as it is seen as a technology customer issues often come in second, which then leads to a technology looking for a market... more
In the world of DNS, there are two types of DNS servers, 'recursion disabled' and 'recursion enabled'. Recursion disabled servers, when asked to resolve a name, will only answer for names that they are authoritative for. It will absolutely refuse to look up a name it does not have authority over and is ideal for when you don't want it to serve just any query. It isn't, however, very useful for domains you don't know about or have authority over... more
As founder and CTO of Ellacoya Networks, a pioneer in Deep Packet Inspection (DPI), and now having spent the last year at Arbor Networks, a pioneer in network-based security, I have witnessed first hand the evolution of DPI. It has evolved from a niche traffic management technology to an integrated service delivery platform. Once relegated to the dark corners of the central office, DPI has become the network element that enables subscriber opt-in for new services, transparency of traffic usage and quotas, fairness during peak busy hours and protection from denial of service attacks, all the while protecting and maintaining the privacy of broadband users. Yet, DPI still gets a bad rap... more
Trademark issues are emerging with the upcoming introduction of new generic top-level domains on the internet, and the board members of the body introducing the names has passed the ball back to intellectual property experts to find answers. The Intellectual Property Constituency of the Internet Corporation for Assigned Names and Numbers (ICANN) has been asked to work out a viable solution "no later than 24 May 2009." Trademark issues have been defined as one of four overarching issues still to be solved before ICANN can finalise the application procedure for the next hundreds or thousands of top-level domains from .eco to .music. more
I received an e-mail from Google Adsense about its new interest-based advertising feature. The latest feature of Google AdSense allows Google to track the behavior of users who click on ads on their AdSense network. It also allows Google users to ‘select’ their interests—this way they would view advertisements based on their category of interest…
moreIn part 1, we explained that the DKIM "d=" value identifies the domain name which signed the message, which may be a different domain name from the author of the message. Tying the signing and author domains together will require an additional standard: Author Domain Signing Practices (ADSP). In IETF parlance, the "author domain" is the domain name in the From: header, so ADSP is a way for the author domain to publish a statement specifying whether any other domain name should ever sign a message purporting to be From: that author domain... more
Many of us are familiar with network effects within telecommunications. Fundamentally, the notion is that as the number of participants in a network increases, the value of that network increases superlinearly. Though many different theories exist about how best to value these networks, the general idea is that the more people on a network, the more benefits accrue to everyone on the network... more
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byVerisign
Sponsored byRadix
Sponsored byDNIB.com