Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Sysadmin’s Guide to Securing Your SaaS Apps

As an admin, app security should be a top priority - but SaaS apps represent a difficult challenge in that regard. How can you protect your business from their risks, while enjoying all their rewards? Within the average enterprise, there are 508 unique cloud applications in use. That number's overwhelming enough on its own without considering that 88% of those applications aren't enterprise ready, or the fact that one in five cloud applications has data sharing as a core functionality. more

Thoughts on the Open Internet - Part 4: Locality and Interdependence

The Internet was not originally designed as a single network that serviced much of the world's digital communications requirements. Its design was sufficiently flexible that it could be used in many contexts, including that of small network domains that were not connected to any other domain, through to large diverse systems with many tens of thousands of individual network elements. If that is indeed the case, then why is it that when networks wish to isolate themselves from the Internet, or when a natural calamity effectively isolates a network, the result is that the isolated network is often non-functional. more

IANA: The World Loses if the Technical Industry Checks Out

On Friday, 14 March 2014, the U.S. Department of Commerce National Telecommunications and Information Administration (NTIA) announced its intention to transition the IANA functions to the global multistakeholder community. As expected, the announcement has sent adrenaline coursing through the veins of Internet governance experts and government policy people the world over. I'd argue, however, that it is an important point for the Internet's technical experts to sit up and take notice, as well: the fact that you are probably saying "what problem does this solve?" is a testimony to how much works well today, and we want to make sure it continues to work well in any future arrangements. more

Fiber to the Home: ‘Awesome’ - But What Is Its Purpose?

Two approaches can be taken towards the development of Fiber to the Home (FttH). One is all about its commercial potential - the sale of the most awesome commercial applications in relation to video entertainment, gaming and TV. The other is a perhaps more sophisticated approach - from the perspective of social and economic development. Of course the two are not mutually exclusive. more

Managing Internet as a Shared Resource: Reasonable Technical Constraints?

The internet is a shared resource. Different access providers begin mixing traffic at different places, but sooner or later, my internet gets mixed into yours. The Canadian Association of Internet Providers (CAIP) application to the Canadian Radio-television and
Telecommunications Commission (CRTC) seems to acknowledge this shared nature with its reference (at paragraph 50 of its application) to the description of the Gateway Access Service its members resell, a description complete with a graphic of a cloud -- a sign that the resource is being shared... more

Ending Cyber-Hubris

Hurricane Katrina will lead the endless finger pointing about what should have been done to strengthen the levees before the storm. However, as a former senior FEMA official under the Clinton Administration explained, "There's only two kinds of levees. Ones that have failed and those that will fail." The same is true for cyber-levees.  more

Keynote Speaker for Name Collisions Workshop: Bruce Schneier

There may still be a few security practitioners working in the field who didn't have a copy of Bruce Schneier's Applied Cryptography on their bookshelf the day they started their careers. Bruce's practical guide to cryptographic algorithms, key management techniques and security protocols, first published in 1993, was a landmark volume for the newly emerging field, and has been a reference to developers ever since. more

The FttH Versus Cable Debate Misses the Point

I recently followed an interesting international discussion on FttH vs. cable. With the fiber to the home (FttH) debate hotting up, driven by the possibility of using FttH as the new infrastructure for the digital economy, the cable companies are putting up a stiff fight, both in Europe (Netherlands) and the USA, claiming FttH is not necessary, and that DOCSIS 3.0 can do the job just as well. In these debates the longer-term national interest is often disregarded. The debate is confined to the technology -- what it can and cannot do -- and it also concentrates on a rather short-term timeframe, say of the next five years. more

100 Years of Monopoly Phone Service

Today is the 100th anniversary of the Kingsbury Commitment which effectively established AT&T, a.k.a. The Bell System, as a government sanctioned monopoly. It was on December 19, 1913 that AT&T agreed to an out-of-court settlement of a US Government's anti-trust challenge. In return for the government agreeing not to pursue its case, AT&T agreed to sell its controlling interest in Western Union telegraph company... more

When Did CIRA Become the Commercial Internet Registration Authority?

Nearly ten years ago, the Government of Canada wrote a letter to the chair of the Canadian Internet Registration Authority (CIRA) that set out the framework for the management of the dot-ca domain. The government articulated a vision of the dot-ca domain as a “key public resource” and called on CIRA to act in an open and transparent manner. CIRA has long sought to live up to those standards, but in recent months the organization has shown an unmistakable shift toward prioritizing commercial gain over the public interest along with a troubling move toward secret decision making... more

What Stopped the Cuban Internet in 1996 and What Is Stopping It Today?

The problem today is bureaucracy and its companions - fear of competition, change and stepping out of line. Cuba connected to the Internet in 1996, but three factors stifled the Cuban Net: the US embargo, economic depression during what the Cubans call the "special period" after the disintegration of the Soviet Union and the Cuban government's fear of free information, which was also fed in part by the Soviet collapse. more

Greylisting Still Works - Part II

In my last post I blogged about greylisting, a well-known anti-spam technique for rejecting spam sent by botnets. When a mail server receives a an attempt to deliver mail from an IP address that's never sent mail before, it rejects the message with a "soft fail" error which tells the sender to try again later. Real mail senders always retry, badly written spamware often doesn't. I found that even though everyone knows about greylisting, about 2/3 of IPs don't successfully retry. more

The Network Management Excuse

Telco front-man Scott Cleland, in a recent blog post, thumbs his nose at the Four Internet Freedoms and says that the FCC should too. Under current leadership, it probably will. Referring to the recent submissions to the FCC by Free Press and Public Knowledge and Vuze complaining about Comcast's use of reset packets to block applications that compete with Comcast's own proprietary video entertainment offering, Cleland says "Network management trumps net neutrality." There are lots of reasons for, ahem, managing. Cleland neglects to observe that controlling congestion the way Comcast does it is like scattering nails in the road for traffic control. more

Why Do We Accept $10 Security on $1,000,000 Data?

Last week we heard of yet another egregious security breach at an online provider, as crooks made off with the names, address, and birth dates of eBay users, along with encrypted passwords. They suggest you change your password, which is likely a good idea, and you better also change every other place you used the same password. But that's not much help since you can't change your name, address, and birth date, which are ever so handy for phishing and identity theft. more

Another Registrant Loses UDRP Where Trademark ‘Spans the Dot’

Here's another example of a domain name dispute where the top-level domain (TLD) was essential to the outcome of the case -- because it formed a part of the complainant's trademark: mr.green. In this decision under the Uniform Domain Name Dispute Resolution Policy (UDRP), the panel joined a short but (slowly) growing list of disputes in which the TLD plays a vital role. more

Topics

Domain Names

Sponsored byVerisign

DNS

Sponsored byDNIB.com

IPv4 Markets

Sponsored byIPv4.Global

Brand Protection

Sponsored byCSC

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days