Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Cisco Speaks at FOSE on IPv6 Enterprise Architecture Transition

"The world is flattening," says Dave Rubal at the FOSE Conference and Exhibition this week in Washington, DC. "The race for IT dominance is on, and it is coming west." Mr. Rubal, Cisco's Worldwide Internet Protocol version 6 (IPv6) Task Force Lead, spoke of the tremendous race in IT dominance that is occurring, stating that the "mainstay technologies at the Beijing Olympics will be IPv6-powered." IPv6 is in line to replace version 4, but Rubal hinted that China and other Far East countries may be adopting the new version faster than the United States... more

Why DNS Blacklists Don’t Work for IPv6 Networks

All effective spam filters use DNS blacklists or blocklists, known as DNSBLs. They provide an efficient way to publish sets of IP addresses from which the publisher recommends that mail systems not accept mail. A well run DNSBL can be very effective; the Spamhaus lists typically catch upwards of 80% of incoming spam with a very low error rate. DNSBLs take advantage of the existing DNS infrastructure to do fast, efficient lookups. A DNS lookup typically goes through three computers... more

Does the First Amendment Forbid Spam Filtering?

A friend of mine wrote to ask: "The Supreme Court overturned the Jaynes conviction on First Amendment grounds, yes? I'm wondering what that could mean from the spam filtering perspective." Spam filters, and in particular DNS blacklists are intended to prevent e-mail from being delivered. Doesn't the First Amendment make it illegal to block speech? The short answer is no, but of course it's slightly more complicated than that in practice. more

Email in the World’s Languages - Part I

Back when the Internet was young end servers came with shovels (for the coal), everyone on the net spoke English, and all the e-mail was in English. To represent text in a computer, each character needs to have a numeric code. The most common code set was (and is) ASCII, which is basically the codes used by the cheap, reliable Teletype printing terminals everyone used as their computer consoles. ASCII is a seven bit character code, code values 0 through 127, and it includes upper and lower case letters and a reasonable selection of punctuation adequate for written English. more

Regulating Big Tech. This Time, for Sure!

United States President Biden has recently commented: “But let me be very clear: Capitalism without competition isn’t capitalism; it’s exploitation. Without healthy competition, big players can change and charge whatever they want and treat you however they want. […] So, we know we’ve got a problem – a major problem.” It’s not every day you hear the President of the United States take on the very industry that supported his national economy remaining the world’s richest over the past couple of decades. Yet his tone resonates with a growing unease within the US... more

NSI: “Don’t Taunt Them, Kill Them”

Clearly whatever it is that Dutch politician Geert Wilders wants to talk about in his film is going to be the end of the internet. The news that Network Solutions decided to pre-empt his use of a domain name registered through them for the purpose of promoting his film need not be re-hashed here. However, before bemoaning yet another registrar freely deciding, as is its right, with whom it chooses to do business, it's important to look at the big picture. No, it is not "censorship" for Network Solutions to decide how it wants its services to be used... But, perhaps we might understand Network Solutions policy more clearly by looking at domain names registered through NSI... more

Domain Name Hijacking Affects Local Illinois Campaign in Will County

We've previously noted here the challenge of dealing with domain name disputes based on personal names, particularly in the political arena. Now that the campaigns are over and all are taking a deep breath, we can reflect back on one of the domain name disputes arising in the political campaign this year for the office of State's Attorney in Will County Illinois. more

Online Drug Traffic and Registrar Policy

Last month I published an article called "What's Driving Spam and Domain Fraud? Illicit Drug Traffic" which explained how the many of the troublesome online crime issues are related to the online sale of narcotics and dodgy pharmaceuticals. Since this article was published we have witnessed one of the largest international law enforcement efforts against online drug traffic (Operation Pangea II)... more

What is Light-Touch Regulation?

One thing I've noticed recently is that a lot of people are climbing on board the idea of building better broadband to rural America. Many people seem to think that the FCC can somehow act to fix a lot of the shortcomings of rural broadband - but in doing so, they have missed the entire point of what the FCC calls 'light-touch' regulation - because, from a practical perspective, broadband is not regulated at all. more

New .VIN Domain Names: What About Accents?

What exactly is that "reserved list of names" Fadi Chehadé refers to in his letter dated October the 22nd? If we already have an idea, we wonder if they considered protecting more than just "accents". The name of Hogan Lovells was mentioned in the last Safebrands "RINDD" and their input on this question is welcome if they are the company to be working on that list. more

GDPR and WHOIS - Winners and Losers

I think we are all hoping that when ICANN meets with the DPAs (Digital Protection Authorities) a clear path forward will be illuminated. We are all hoping that the DPAs will provide definitive guidance regarding ICANN's interim model and that some special allowance will be made so that registrars and registries are provided with additional time to implement a GDPR-compliant WHOIS solution. more

In an Internet Minute

Intel sent an interesting infographic: What Happens in an Internet Minute. Looking at the traffic data, Intel asks if there is sufficient attention being paid to investment in infrastructure. Imagine the state of the network in three years, when the number of connected devices is projected to be double the world's population. Can our networks scale to handle predicted traffic and meet consumer expectations for immediate access from multiple devices? more

IPv4 Historical Imbalances and the Threat to IPv6

It is an open secret that the current state of IPv4 allocation contains many accidental historical imbalances and in particular developing countries who wish to use IPv4 are disadvantaged by the lack of addresses available through ordinary allocation and are forced into purchasing addresses on the open market. As most of the addresses for sale are held by organisations based in the developed world, this amounts to a transfer of wealth from the developing world to the developed world, on terms set by the developed world. more

Call for Participation - ICANN DNSSEC and Security Workshop for ICANN78 Annual General Meeting

In cooperation with the ICANN Security and Stability Advisory Committee (SSAC), we are planning a DNSSEC and Security Workshop for the ICANN78 Annual General Meeting being held as a hybrid meeting from 21-26 October 2023 in Hamburg, Germany in the Central European Summer Time Zone (UTC +2). This workshop date will be determined once ICANN creates a block schedule for us to follow; then we will be able to request a day and time. more

7 Must Have Attributes of an IP Address Management System

Exponential growth of networks combined with the complexity introduced by IT initiatives e.g. VoIP, Cloud computing, server virtualization, desktop virtualization, IPv6 and service automation has required network teams to look for tools to automate IP address management (IPAM). Automated IPAM tools allow administrators to allocate subnets, allocate/track/reclaim IP addresses and provide visibility into the networks. Here are some examples of what a typical IPAM tool can do... more

Topics

DNS

Sponsored byDNIB.com

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days