Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

More on the Front Running Class Action Suit

Several people pointed out that although the suit still hasn't appeared in PACER, copies of the complaint are available online, including this one [PDF] at Lextext. Having read it, I'm rather underwhelmed... I do not purport to be a lawyer (nor do I usually play one on the net), but it's hard to see how the facts, which are not in serious dispute, would support any of these charges. more

Behind the Smoke Screen of Internet and International Infrastructure

In my recent write-up I start by discussing some recent threats network operators should be aware of, such as recursive DNS attacks. Then, a bit on the state of the Internet, cooperation across different fields and how these latest threats with DDoS also relate to worms and bots, as well as spam, phishing and the immense ROI organized crime sees. I try and bring some suggestions on what can be done better, and where we as a community, as well as specifically where us, the "secret hand-shake clubs" of Internet security fail and succeed. Over-secrecy, lack of cooperation, lack of public information, and not being secret enough about what really matters. more

Evolution of the Dot Brand Domains in 5 Years

ICANN's last new gTLD application closed in 2012 with more than 600 brands applying for their dot brand. Dot brand domains associate a keyword or keyphrase and a brand name in a complete domain name... To understand better how the evolution of the dotBrand has been throughout these years, number of websites launched, redirects, registries etc, Dot Brand Observatory prepared a few visual graphics. more

Domain Names as Second-Class Citizens

A new book by Dr. Konstantinos Komaitis (Lecturer in Law at the University of Strathclyde) provides a passionate yet legalistic and well-researched overview of the legal, institutional and ethical problems caused by the clash between domain names and trademarks. This is really the first decent book-length treatment of what is now a decade and a half of legal and political conflict between domain name registrants and trademark holders. more

Don’t Rely on Initial TLD Registration Volumes

When deciding to register a given domain name under any of the new ICANN-proposed top-level domains (TLDs), remember that a relatively high initial registration volume does not necessarily imply that the domain names will command high market value or that demand for them will grow. Below are some of the reasons... more

Haiti’s Telecommunications Sector in the Aftermath

The scale of the devastation inflicted by Haiti's earthquake a little over two weeks ago, meant that no industry has been left untouched by its effect. The telecommunications sector is no exception. Ever since the earthquake struck on Tuesday 12th January, fixed line and wireless communications have been virtually unavailable. more

DNSAI Compass: Six Months of Measuring Phishing and Malware

The DNS Abuse Institute recently published our sixth monthly report for our project to measure DNS Abuse: DNSAI Compass ('Compass'). Compass is an initiative of the DNS Abuse Institute to measure the use of the DNS for phishing and malware. The intention is to establish a credible source of metrics for addressing DNS Abuse. We hope this will enable focused conversations, and identify opportunities for improvement. more

Domain Names Identical to Trademarks But No Likelihood of Confusion

Confusion is a basic element in both cybersquatting and trademark infringement. It appears twice in the UDRP; once in paragraph 4(a)(i) in the adjectival phrase "confusing similarity", and once in paragraph 4(b)(iv) in the phrase "likelihood of confusion." Each use of the distinctive phrases is directed to a different observer. More of this in a moment. The first relates to standing; the second to infringement. Unless a party has standing it can have no actionable claim. more

Bill C-27: Historic Canadian Anti-spam Legislation Battered, But Still Unbeaten

As readers of CircleID have seen, there has been a lot of activity (for example, Michael Geist's "Canadian Marketing Association Attacks Anti-Spam Bill"), as the final votes of C-27 grow nearer. The history towards getting a spam law passed in Canada has been a long one. For years, CAUCE encouraged legislators to undertake this important work... Fast forward a few years, and a few governments, and suddenly we have a law tabled in the House of Commons... more

Wikileaks and the Gaps in Internet Governance

The recent publication of leaked United States diplomatic cables by Wikileaks has produced an extremist reaction by some governments, provoking them and compliant large corporations to strike out at the organisation's Web site, its financial base, and the person of its founder, Julian Assange. For the Civil Society Internet Governance Caucus (IGC), this highlights the need for cross-border Internet governance issues to be made subject to a due process of law, informed by sound political frameworks, including those of human rights. more

Notes from NANOG 81

As the pandemic continues, the network operator community continues to meet online. NANOG held its 81st meeting on February 8 and 9, and these are my notes from some of the presentations at that meeting... Ethernet, developed in 1973 at Xerox PARC, was a revolutionary step in network architectures in many ways. The common bus architecture imposed several constraints on the network that have echoed through the ensuing four decades in all kinds of ways. more

7 Tips to Boost BYOD Security

The bring-your-own-device (BYOD) trend continues to make corporate inroads. According to Security Intelligence, more than 60 percent of enterprises now allow or "tolerate" employee mobile device use in the workplace. But companies still have significant security concerns, especially when it comes to the specter of lost data. Here are seven tips to boost BYOD security in 2015. more

The Design of the Domain Name System, Part V - Large Data

In the previous four installments, we've been looking at aspects of the design of the DNS. Today we look at the amount of data one can ask the DNS to store and to serve to clients. Most DNS queries are made via UDP, a single packet for query and a single packet for the response, with the packet size traditionally limited to 512 bytes. This limits the payload of the returned records in a response packet to about 400 bytes... more

How Many IPv4 Addresses Does the RIPE NCC Have Left?

Since IANA ran out of IPv4 addresses, people are increasingly aware of how short the remaining lifetime of IPv4 is. With World IPv6 Day taking place this week, the issue has come into even sharper focus. Since March 2011, the RIPE NCC has been publishing the size of its pool of available IPv4 addresses. All five Regional Internet Registries (RIRs) regularly publish the status of their IPv4 address pools. In the image below, you can see how the number of IPv4 addresses in the RIPE NCC pool changes over time. more

Google as DNS, Wikileaks as PoC

Wikileaks is still accessible -- via Google. Does that change anything? For many Internet users IP addresses as well as domain names are completely transparent. Further, Google (and other search engines) and often the first stop when these users wants to find a service, or a web site. Thus, many of us discussed over the years the eventual viability of Google (... and other search engines) as "DNS" (note the "'s). Now, don't jump at my throat quite yet... more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days