Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Deploying DNSSEC: Lessons from Domain Registrar Implementation

As a registrar at the front end of the DNSSEC deployment effort, our technical team has made a sustained investment in DNSSEC deployment so that our customers don't get overwhelmed by this wave of changes to the core infrastructure of the Domain Name System. Along the way, we've learnt a lot about how to implement DNSSEC which might hold useful lessons for other organizations that plan to deploy DNSSEC in their networks. more

Cybercrime and “Remote Search”

According to news reports, part of the EU's cybercrime strategy is "remote search" of suspects' computers. I'm not 100% certain what that means, but likely guesses are alarming. The most obvious interpretation is also the most alarming: that some police officer will have the right and the ability to peruse people's computers from his or her desktop. How, precisely, is this to be done? Will Microsoft and Apple – and Ubuntu and Red Hat and all the BSDs and everyone else who ships systems – have to build back doors into all operating systems? more

WSIS+20 and the Youth Dilemma: Rethinking Participation in Global Internet Governance

On Wednesday, 9 July, I attended the WSIS+20 HLE Overall Review multistakeholder consultation with co-facilitators H.E. Mr Ekitela Locale from the Republic of Kenya, and H.E. Ms Suela Janina from the Republic of Albania with my UNU-CRIS hat and had the opportunity to talk with them together with my fellow youth IGF colleagues Dana Cramer and Jasmine Ko. We discussed youth participation in Internet governance, and I raised my concerns about the future of youth IGFs. more

Superstorm Sandy and the Global Internet

The Internet has managed to collect its fair share of mythology, and one of the more persistent myths is that from its genesis in a cold war US think tank in the 1960's the Internet was designed with remarkable ability to "route around damage." Whether the story of this cold war think tank is true or not, the adoption of a stateless forwarding architecture, coupled with a dynamic routing system, does allow the network to "self-heal" under certain circumstances. Can we see this self-healing in today's network? more

A Logical Place to Start the IPv6 Transition

The transition to IPv6 is top of mind for most service providers. Even in places where there are still IPv4 addresses to be had surveys we've run suggest v6 is solidly on the priority list. That's not to say everyone has the same strategy. Depending where you are in the world transition options are different -- in places such as APAC where exhaustion is at hand one of the many NAT alternatives will likely be deployed since getting a significant allocation of addresses is not going to happen and other alternatives for obtaining addresses will prove expensive. more

A Look at Nine Years of RIPE Database Objects: IPv6 Objects on the Rise

The RIPE Database is about to enter its fourth decade. It began humbly as a place to store network and contact information back when the RIPE community formed in 1989. When the RIPE Network Coordination Centre (NCC) was created three years later and started to assign and allocated IP address space, the database was expanded to include the registration of more detailed network and routing information. more

Mobile Trumps Fixed Broadband

"80% of Web users will choose mobile broadband over fixed by 2013" is the headline of a Total Telecom interview with John Cunliffe of Ericsson. I agree with the conclusion although I think Ericsson will be unpleasantly surprised to find that LTE is NOT the technology which leads to this revolution. Mobile access at speeds at least equal to what cable offers and at a price lower than today's cable broadband will be available both in the home and on the road within a year or two at the most. more

Transfers of Domain Names Contemporaneous with Complaint: Cyberflight?

Cyberflight (defined as strategically transferring accused domain names to another registrar or registrant upon receipt of a complaint) was a sufficient irritant by 2013 for the ICANN to adopt recommendations to amend the Rules of the Uniform Domain Name Dispute Resolution Policy (UDRP). Effective July 1, 2015 the Rules now include a requirement for locking the domain as well as a change in the timing of transmitting the complaint to respondents. Before the amendment there had been no uniform approach to locking. more

The Broad Brush of LegitScript, Painting Inaccuracies About CIPA

The president of LegitScript recently authored an inaccurate and misleading critique of the Canadian International Pharmacy Association (CIPA) that was clearly intended to smear our reputation with a broad brush dipped in inaccuracies and scare tactics. This response paints the true picture of who we are and the benefits CIPA Members offer U.S. consumers. more

Multi-Stakeholderism and the ‘Coalition of the Willing’

I was part of a group of about 200 people who attended and update at the Internet Governance Forum in Bali on the Montevideo statement. I'd like to share a few of my observations, and offer some unsolicited advice. First, the de facto leader of the and champion of the multi-stakeholder model, the United States, has been sent to the penalty box in light of the NSA surveillance revelations. more

LegitScript to Release Monthly Data on Rogue Internet Pharmacy Registrar Clustering

One of the most important debates in the realm of Internet governance pertains to when, how and how much voluntary action registrars can and should take to prevent the use of their registration platforms in furtherance of criminal activity. In the Internet pharmacy world, the trend over the past four years has been unmistakable: A growing number of registrars worldwide, large and small, recognize the value of prohibiting the use of their registration services... more

A Three-Step Process to Chase Compulsive Domain Brand Squatters

Domain brand squatting can be defined as the unauthorized or dishonest use of a brand or company identifiers in domain names. It is often linked to the use of look-alike domains in bad faith, and we see it all the time. The threat actors behind these domains are called different names, though a prevalent one would be “typosquatters.” The Hot on the Trail of Compulsive Brand Squatters webinar showcased how these people are infiltrating the Internet. The first page of PhishTank’s valid phish search alone as of this writing tells us that domain brand squatting is a real and present danger. more

Questions Raised by the Takeover of SNET, Havana’s Community Network

Last May, Cuba's Ministry of Communication (MINCOM) announced resolutions 98 and 99 limiting wireles stransmission power and outdoor cables that made community networks like Havana's SNET, illegal. Since SNET was the world's largest community network that did not have Internet access, implementation of the resolutions was postponed for 60 days for negotiations between SNET administrators and MINCOM. more

What Mobile Malware Looks Like

Last month at the Virus Bulletin Conference in Barcelona, I took in one of the sessions on mobile malware. This type of malware is foreign to me because I mostly stay in the email space at work (and even then, I am focusing more on day-to-day issues of running a large mail provider than I am on spam and abuse). What's mobile malware like? What are the threats? How do users get infected? more

Google and Verizon: Interesting Open Internet Bedfellows

The debate around Network Neutrality is sometimes simplified as carriers against content providers, the owners of networks against the businesses that have grown due to Internet connectivity. So it was interesting to read that Google and Verizon filed a joint submission to the FCC last week, laying out in detail how the two companies agreed on many issues regarding an "Open Internet." more

Topics

Domain Names

Sponsored byVerisign

DNS Security

Sponsored byWhoisXML API

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days