Apple's Wordwide Developers Conference may have just ended, but already, the conference release of Mac's OS X 10.6 — a beta build previewed for developers — has been leaked onto torrent sites. It borders on irony: for years, Mac lovers have touted the superior security of the Mac operating system over Windows, but earlier this year, it was torrent sites — the very sites where OS X 10.6 is now being freely copied — that caused more than 25,000 Mac users to fall victim to the iServices Trojan. Some Macs never learn. more
The most contentious issue throughout negotiations was that of scope—whether the Convention would cover the private sector at all, and if so, to what extent. Leaks of the negotiations and commentary by journalists indicate that several states, primarily the United States, were keen to see the Convention not directly applying to private entities. more
Straightforward out-of-court domain name proceeding can provide efficient relief against fraudulent websites and email. Google has seen a steep rise amid the Coronavirus pandemic in new websites set up to engage in phishing (i.e. fraudulent attempts to obtain sensitive information such as usernames, passwords and financial details). Companies in all industries - not just the financial sector - are at risk from this nefarious practice. But one relatively simple out-of-court proceeding may provide relief. more
ICANN has tentatively agreed to proceed with the community-developed Trademark Clearinghouse (TMCH) model following two days of discussions at a specially organised informal meeting in Brussels last week. I believe this is an important breakthrough for the intellectual property, registry and registrar communities as it provides the best harmony between technical implementation and best practice trademark protection policy. more
There was a planning meeting for what became Usenet at Duke CS. We knew three things, and three things only: we wanted something that could be used locally for administrative messages, we wanted a networked system, and we would use uucp for intersite communication. This last decision was more or less by default: there were no other possibilities available to us or to most other sites that ran standard Unix. Furthermore, all you needed to run uucp was a single dial-up modem port. more
This year, the 25th anniversary of the creation of ICANN was celebrated. The date carries a commemorative meaning, highlighting the trajectory of this institution that has been fundamental in the coordination and administration of Internet resources. However, this milestone also highlights the growing challenges facing Internet Governance in the current global landscape. more
Each SANSFIRE, the Handlers who can make it to DC get together for a panel discussion on the state of information security. Besides discussion of the hot DNS issue, between most of us there is a large consensus into some of the biggest problems that we face. Two come to mind, the fact that "users will click anything" and that "anti-virus is no longer sufficient". These are actually both related in my mind... more
When we set out to design the over-the-wire file format, we were certain of one thing: we wouldn't get it perfectly right. That led to our first decision: the very first character of the transmitted file would be the letter "A" for the version. Why not a number on the first line, including perhaps a decimal point? If we ever considered that, I have no recollection of it. more
Elon Musk is a self-proclaimed "free speech absolutist" which leads some to worry that Twitter will be open to the sort of thing one finds at gab.com if his purchase of the company is completed. I have no idea what Musk plans to do with Twitter but let me offer some optimistic speculation. For a start, I don't believe Musk will use Twitter to advance right-wing candidates or policy. more
The 24th DNS-OARC meeting was held last week in Buenos Aires -- a two-day DNS workshop with amazingly good, consistent content. The programme committee are to be congratulated on maintaining a high quality of presentations. Here are my picks of the workshop. They fall into three groups, covering themes I found interesting... These presentations related to the ongoing problem of DNS as a source of reflection attacks, or a victim of attempted DDoS... more
At the start of the year, many responsible for managing domain name portfolios may be considering spring cleaning! Traditionally, such a task consists of a review to check that all domains in the portfolio serve a purpose either from a commercial or defensive perspective. The aim is to ensure budget isn't wasted on domains of little to no value. It's fair to say that for many organizations, this is a difficult process - almost as feared as actually spring cleaning our own homes. more
Think your organization is exempt from in-house network abuse? Think again. A CFCA Global Fraud Survey of communication service providers found that dealer fraud was one of the top five methods of fraud, costing $US 3.35 billion annually. In this scenario, customer service representatives (CSRs) or administrators with access to account information may upgrade friends or family to a premium service package or even provide free access to services. more
The IDN ccTLD Fast Track program is moving along rapidly, with ICANN's announcement that both the Simplified and Traditional Chinese script versions of .china have passed the string evaluation phase of the IDN ccTLD Fast Track Program. Alongside this, ICANN have also announced the release of a proposed implementation plan for 'Synchronised IDN ccTLDs' that will create the rules by which these variant IDN ccTLDs will coexist. more
It's been a while since I checked in to see how the U.S. is doing in the 5G race. I haven't been following the issue since before the pandemic when the U.S. government was tossing around the idea of buying a controlling interest in Nokia or Ericsson. That idea went nowhere but led to a lot of articles in the business press. I decided to look anew after seeing recently that the FCC is estimating that it would cost U.S. carriers about $1.8 billion to replace Huawei and ZTE gear in U.S. more
Advancements in virtual private networking have extended system capabilities for service providers. Providers can divide LANs into multiple discrete segments using either Virtual Local Area Networks (vLANs), leverage Multiprotocol Label Switching (MPLS) or Virtual Routing and Forwarding (VRF) to host Virtual Private Networks (VPNs) that support service operations over multiple instances. more
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byCSC
Sponsored byVerisign
Sponsored byWhoisXML API