Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Apple iPhone Promoting .com TLD?

One of the key features of the soon-to-launch iPhone is its advanced web browser capabilities. "The iPhone is the first smart phone we've tested with a real, computer-grade Web browser, a version of Apple's Safari," say the Wall Street Journal. To make the user's browsing experience even more efficient, the phone even comes with a top-level domain (TLD) button labeled ".com". Rather interesting given that today there are over two hundred TLDs in existence including .mobi... more

Four-Pronged Approach to Keep Your Domain Names and DNS Secure from Cyberattacks

Domain names, domain name systems (DNS), and digital certificates are fundamental components of the most important applications that enable your company to conduct business - including your website, email, voice-over IP, and more. However, these vital applications are being attacked with an increasingly high level of sophistication and severity. more

Law and Disorder: When .Brand Meets .Crime

Barclays Bank is a .brand pioneer, having recently announced plans to migrate its primary online presence to two new gTLDs it will operate on its own behalf. But Barclays Bank has also just plead guilty to a major financial services felony and been fined $2.4 billion for that criminal activity. While the new gTLD Registry Agreement is clear that a registry operator must remove any officer or director convicted of a felony, it is ambiguous in regard to whether the Agreement can be terminated when the operator itself has been found to have operated a criminal enterprise. more

Will 2016 Politics Trump Bipartisan Support for the MSM and DOTCOM Act?

The bitter partisan divide that characterizes so many of official Washington's current policy discussions was conspicuous in its absence at the July 8th hearing held on "Internet Governance Progress After ICANN 53" by the House Energy and Commerce Committee's Subcommittee on Communications and Technology. In opening remarks that asked "What is the multi-stakeholder community, anyway?", Subcommittee Chairman Greg Waldren went on to declare that he and his colleagues "sought to strike the right balance between supporting the multi-stakeholder model of Internet governance, while still protecting the invaluable tool of communications and commerce the Internet has become". more

The Proxy Fight for Iranian Democracy

If you put 65 million people in a locked room, they’re going to find all the exits pretty quickly, and maybe make a few of their own. In the case of Iran’s crippled-but-still-connected Internet, that means finding a continuous supply of proxy servers that allow continued access to unfiltered international web content like Twitter, Gmail, and the BBC... more

Vint Cerf Caught Off Guard, Nevertheless Says What Needs to Be Said About Our Misguided Policy

This morning's mail brought news of a 3 minute 45 second video clip of very candid and very outstanding remarks from Vint Cerf. Vint says very clearly what needs to be said and what needs to be grasped and acted on by the new president and congress next year... My observation is that in my opinion it is not the lighting that is unusual but rather the camera angle. It looks like interviewer is seated with his camera pointed up. The camera is looking at Vint's chin. Consequently I sent Vint an email: "you knew you were being recorded - surely? I hope: in any case the good deed is done... thank you sir." Vint replied with permission to quote... more

Some Internet Measurements

At APNIC Labs we've been working on developing a new approach to navigating through some of our data sets the describe aspects of IPv6 deployment, the use of DNSSEC and some measurements relating to the current state of BGP. The intent of this particular set of data collections is to allow the data to be placed into a relative context, displaying comparison of the individual measurements at a level of geographic regions, individual countries, and individual networks. more

IPv6 and the Fear of Brokenness

Brokenness refers to the situation whereby a website is made accessible in dual stack, meaning both IPv4 and IP6, using records referred to as A's for IPv4 and quad A's for IPv6. Some end-users can experience slower access to the website or in some rarer instances no access at all. Brokenness is mostly attributable to older versions of the Mac Os operating system... The brokenness issue has been very well described by Eric Vyncke... more

ICC Paper on Clearing Up Confusion Over Internet Governance

I just wanted to call people's attention to this International Chamber of Commerce (ICC) paper on Internet governance. I don't endorse it; haven't actually read it yet, but their say will play a big role and should be widely known: "Coming barely a month after the World Summit on the Information Society (WSIS) in Geneva, and prepared by ICC's Commmission on E-Business, IT and Telecoms, the paper divides the issue of Internet governance into three main components - technical engineering, coordination of the names and numbers system and public policy matters." more

The Death of TLD Front Running

In an article published over two years ago, I cited a disturbing trend of third parties seeking to obtain national trademark registrations in an apparent attempt to game ICANN's new gTLD process. While many of these applications have withered and died on the vine some have sneaked through. However, it appears that the United States Trademark Trial and Appeal Board (TTAB) has issued a very well-reasoned and articulate opinion... more

The RIRs in a Post-IPv4 world: Is the End of IP Address Policy Making Nigh?

IANA's IPv4 pool was officially exhausted in early 2011; Regional Internet Registries (RIRs) are gradually eating through their remaining IPv4 reserves and, although there will always be a trickle of recycled IPv4 addresses coming through as businesses go bust or ISPs move entirely to IPv6, the bulk of RIR IPv4 activity in future will be maintenance of existing allocation records... While IPv6 is definitely the way of the future for the Internet, the sheer size of the IPv6 address pool, combined with simplified allocation policies that have deliberately reduced barriers to entry, means there are very few organizations that can't get IPv6 directly from the RIRs these days. more

International Law and Cyberspace: It’s the “How”, Stupid

The Internet has enhanced freedom of communication, ignored national borders, and removed time and space barriers. But the Internet sphere was never a law-free zone. Already ICANN's "Articles of Incorporation" (1998) constituted that the management of critical Internet resources has to take place within the frameworks of "applicable national and international law". more

Mitigating DDoS

Your first line of defense to any DDoS, at least on the network side, should be to disperse the traffic across as many resources as you can. Basic math implies that if you have fifteen entry points, and each entry point is capable of supporting 10g of traffic, then you should be able to simply absorb a 100g DDoS attack while still leaving 50g of overhead for real traffic... Dispersing a DDoS in this way may impact performance -- but taking bandwidth and resources down is almost always the wrong way to react to a DDoS attack. But what if you cannot, for some reason, disperse the attack? more

Internet Reporting Hotlines Are Censoring Art as Child Sexual Abuse

This week United States Attorney-General William Barr cited the need to address child exploitation as one of the factors motivating a mooted review of law called CDA 230, which provides that Internet companies aren't responsible for what their users say or do online. There are many dimensions to the problem of child exploitation, ranging from inappropriate comments on Instagram photos to child grooming on Fortnite... more

How to Discredit Net Neutrality

On Tuesday (November 30) Internet backbone provider Level3 publicly accused cable-based ISP Comcast of trying to thwart competing video services delivered through the internet. Comcast was, according to Level3, suddenly choosing to charge it more because of its carriage of Netflix traffic. The accusation was consciously framed to raise net neutrality alarms. It appeared as if a cable TV giant was using its control of internet access to make access to a competing, over the top video service more expensive... Then the full story came out. more

Topics

DNS Security

Sponsored byWhoisXML API

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days