Featured Blogs

Latest

Reforming Whois

Now that we're into the New Year and deadline for public comment on the proposed new .CA whois policy nears and now that my term as a CIRA Director enters its home stretch, I wanted to take some time to elaborate further on my Unsanctioned Whois Concepts post from long ago and revise it somewhat. more

Person to Person Security and Privacy Infringement

IT security strategies invariably focus on maintaining impenetrable fortresses around computers and network systems. Firewalls, virtual private networks and anti-virus programs are the tools IT engineers use to create their digital security. Sophisticated defense systems can be very effective at keeping the obvious attackers at bay, yet they often create a false sense of security because the real attacks, the kind that inflict irreparable damage on a system or network, avoid the obvious routes into the secure fortress. more

Tracking Internet Piracy: Harder Than You Think

Wired Magazine recently published an article called "The Shadow Internet", where it says: "Anathema is a so-called topsite, one of 30 or so underground, highly secretive servers where nearly all of the unlicensed music, movies, and videogames available on the Internet originate. Outside of a pirate elite and the Feds who track them, few know that topsites exist. Even fewer can log in." But what are the difficulties in tracking and identifying these so-called topsites? Joel Snyder, a senior network consultant responds. more

2004: The Year That Promised Email Authentication

As the year comes to a close, it is important to reflect on what has been one of the major actions in the anti-spam arena this year: the quest for email authentication. With email often called the "killer app" of the Internet, it is important to reflect on any major changes proposed, or implemented that can affect that basic tool that many of us have become to rely on in our daily lives. And, while many of the debates involved myriads of specialized mailing lists, standards organizations, conferences and even some government agencies, it is important for the free and open source software (FOSS) community as well as the Internet community at large, to analyze and learn lessons from the events surrounding email authentication in 2004. more

Internet to ITU: Stay Away from My Network

An ITU document entitled "Beyond Internet Governance" crossed my desk earlier this week. Given that I had absolutely nothing better to do, I decided to give it a read. The audacity of the ITU Secretariat is nothing less than shocking. It has been a long while since I read such a self-serving, narrow-minded and inaccurate document. The backbone of the ITU's contention rests on the premise that something called the Next Generation Network and the contention that this network will act as one big bug fix for all the problems created by current inter-networking technology. more

Chinese IDN in the News

News.com published a well-research article on the Chinese Domain Names by Winston Chai: "This approach works fine in the English-savvy world. However, for non-English speakers, they could be faced with the unenviable task of rote-learning numerical IP addresses, which is highly improbable, or the English spellings of dozens of Web sites they want to access." Just a few points of interest... more

A Political Analysis of SPF and Sender-ID

In my spare time when I'm not dealing with the world of e-mail, I'm a politician so now and then I put on my cynical political hat. At the FTC Authentication Summit one of the more striking disagreements was about the merits and flaws of SPF and Microsoft's Sender-ID. Some people thought they are wonderful and the sooner we all use them the better. Others thought they are deeply flawed and pose a serious risk of long-term damage to the reliability of e-mail. Why this disagreement over what one might naively think would be a technical question? more

Engineers on TLDs: Do You Want Me With Fries?

During ICANN's public forum in Cape Town, an interesting conflict accidentally came up, even if somewhat concealed by the usual exchange of well-known views on whether ICANN should finally allow the world to get more new Top Level Domains (TLDs) on a regular basis. I know I am oversimplifying thoughts and positions, but basically the discussion was between a couple of 30-year-old engineers from the floor asking to be given the opportunity to try new things, and a couple of 60-year-old engineers from the podium putting up any kind of unproven excuses... more

Reaction to New Top Level Domains

ICANN's latest announcement of preliminary approval for two new top level domains (.mobi and .jobs) and it's recently ended meetings in Cape Town, South Africa, have sparked off renewed discussions for the introduction of new TLDs -- more specifically, the expansion of sponsored and generic top level domains (TLDs). The following is a collection of recent commentaries made by both technical and non-technical members of the community with regards to the expansion of the domain name space. To add your comments to this collection, please use the comment entry form at the bottom of the page... more

New study: Over Half of French Enterprises Blacklisted

Public blacklists are used on a daily basis by many enterprises in order to curb spam. Frederic Aoun and Bruno Rasle, co-authors of the book "Halte au Spam", unveiled today their latest study on the subject. This contribution is divided in two parts... more

Third-Level Domain Name Hijacking

A new type of domain-name hijacking is being carried out unnoticed. It involves third-level domain-names associated with affiliate programs. If you had been an online affiliate of, say, company xyz.com, your affiliate Internet address could have looked like YourCompanyName.xyz.com. more

Internet Management and National Security: Time for a Federal Action Plan

Former CIA Director George Tenet recently gave a speech highlighting the need for federal action on internet management in order to protect national security. As reported by the online edition of Government Executive, Mr. Tenet explained that, "greater government regulation of the Internet and telecommunications networks is needed in order to guard against terrorist attacks." more

Time for Reformation of the Internet

An anonymous writer posted an article titled Time for Reformation of the Internet on Susan Crawford's blog. The article calls for a liberal approach towards ICANN, making a number of references to IETF and its process. "It's time for netizens to come to a similar realization about their direct relationship with the empowerment offered by the internet. None of the core principles that produced the net give any set of clerics -- even the original engineers, or ISOC, much less ICANN -- the right to prevent innovation at the edge..." more

Are We Attending the Right ICANN Meeting?

I have no idea who wrote that wonderful piece, Time for Reformation of the Internet, posted by Susan Crawford. (It wasn't me - I never use the word "netizen".) Elliot Noss of Tucows wrote a partial rebuttal, I must be attending the wrong ICANN meetings. Elliot's company, Tucows, has been a leader in registrar innovation and competition. And Tucows has constantly been among the most imaginative, progressive, responsible, and socially engaged companies engaged in these debates. ...But the points made by Time for Reformation of the Internet go far beyond registries and registrars. more

The Accountable Net: Who Should Be Accountable?

Two weeks ago, the Federal Trade Commission held a summit on e-mail authentication in Washington, DC; the community of people who handle bulk mail came together and agreed on standards and processes that should help reduce the proliferation of spoofed mail and fraudulent offers. This was a big, collective step in the right direction. But e-mail sender authentication alone won't solve the Net's fraud and phishing problems - nor will any single thing. It requires a web of accountability among a broad range of players. Yet this week there's another meeting, in Cape Town, South Africa, that could make even more of a difference...but it probably won't. more

Topics

Cybersecurity

Sponsored byVerisign

DNS

Sponsored byDNIB.com

Threat Intelligence

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

New TLDs

Sponsored byRadix

Brand Protection

Sponsored byCSC

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days