Most people who have wireless Ethernet at home, or the office, connect to the wireless network by attaching to a wireless Access Point, or AP. This method of wireless networking is called "Infrastructure Mode". If you have a secure wireless network configured in "Infrastructure Mode" you are using MAC address filtering, some level of encryption, and have made some additional changes to your AP in order to prevent just anyone from using it or capturing data. ...However, for those who are not using "Infrastructure Mode", and are configured to communicate from machine to machine, or "Ad-Hoc", there are a few things you should be aware of. more
The basic problem posed by WSIS was the role of national governments and national sovereignty in global Internet governance. That conflict remains completely unresolved by the WSIS document. The document's thinking is still based on the fiction that there is a clear divide between "public policy" and the "day to day operation" of the Internet, and assumes that governments should be fully in control of the policy-setting function. Moreover, new organizational arrangements are being put into place which will carry on that debate for another 5 years, at least. The new Internet Governance Forum is a real victory for the civil society actors, but also fails to resolve the basic issue regarding the role of governments and sovereignty. Although called for and virtually created by civil society actors, the language authorizing its creation asks to involve all stakeholders "in their respective roles." In other words, we still don't know whether this Forum will be based on true peer-peer based interactions among governments, business and civil society, or whether it will reserve special policy making functions to governments. more
The long awaited Service Concession Contract to operate the .eu registry was signed yesterday (Oct. 12). Now the European Commission will formally notify ICANN of the selected registry operator allowing official negotiations to commence between EURid and ICANN to have .eu put in the root. According to the press release, registrations could begin in six to nine months... more
The recent row between Google, Apple and AT&T concerning the removal of Google Voice from the Apple iPhone store highlights the friction existing between network operators and so-called over the top (OTT) application providers. Most observers believe that AT&T initiated the blockade because Google Voice (which offers free or highly discounted calling rates) is a direct threat to AT&Ts call revenue (Google Voice users need only pay AT&T for access to the Internet). more
If you have rules and regulations but don't enforce them then there's little point in having any rules or regulations in the first place. One of the criticisms that is often leveled at ICANN is with regard to compliance issues. There are a number of areas where ICANN accredited registrars may be flounting the rules, but if nobody does anything about it then none of the registrars will have any incentive to actually comply. more
When I was employed, I ran my own mail server and my own BlackBerry Enterprise Server, and I had things tuned pretty much exactly as I wanted them. My incoming mail got some custom processing that looked the sender's address up in my address book and assigned the message a category... I was a very happy email user. Now that I'm on my own, I've decided not to run my own server and all that software, and I've switched to Gmail and the T-Mobile BlackBerry server... Surprisingly, though, I'm mostly still happy... more
The North American Network Operators Group (NANOG) conference, a gathering of Internet Service Provider (ISP) engineers and vendors convenes three times a year for mostly technical conversation along with social networking. The recent NANOG conference in Reston Virginia saw some unusually direct talk about Spam and the ISPs that tolerate it from America Online's Postmaster, Charles Stiles. more
The 2024 "To-Do-List" for all stakeholders in the global Internet Governance Ecosystem is a very long one. Not only the real world but also the virtual world is in turmoil. Vint Cerf once argued that the Internet is just a mirror of the existing world. If the existing world is in trouble, the Internet world has a problem. more
The amount of time one spends actually working for ICANN is enormous. And that limits the people who can actually work for ICANN as directors. I say "work", but you should know that this is not a paid work. Nope. It's being performed for free -- we dedicate our time and skills to ICANN free of charge. Many people ask me "What is it like to be on the Board of ICANN?" Here is my response, with some astonishing data. more
The U.S. Internet Revenue Service now says that criminals already had most of the information that credit bureau Equifax lost in a breach that revealed personal information about nearly 150 million people. The incident at Equifax and the IRS' mid-October admission of how much-stolen data was already in criminal hands may force changes in how the world handles personal information. more
Rep's Graves and Sinema recently introduced H.R. 4036, the catchily named Active Cyber Defense Certainty Act or ACDC act which creates some exceptions to criminal parts of computer crime laws. Lots of reports have decried "hack back" but if you read the bill, it's surprisingly well targeted. The first change is to what they call Attributional Technology, and says it's OK to put bait on your computer for an intruder intended to identify the intruder. more
In the final part of this 3-part series article, the issue of UDRP in proving bad-faith domain registrations that are held passively is examined with respect to the trademark's characteristics. The registrant's attitude could in some circumstances also be regarded as evidence of bad faith use of a domain name that is held passively. Panels often infer evidence of bad faith of the registrant from an unsatisfactory response or an absence of response to the complainant or if it is impossible to contact the respondent. more
In a report released today, VeriSign has stated that more than 4.7 million new domain names registered during the first quarter of 2004 -- highest ever recorded in a three-month period. "The profile reveals that more than 63 million domain names have now been registered, approximately one for every 100 people living in the world today. This number is greater than at any time in the Internet's history, surpassing even the heights that were seen during the Internet "bubble." Moreover, data reveal that the current base of domain names is being utilized more actively than ever before, as measured by renewal rates, look-up rates, and the percentage of domain names tied to live sites." more
An article in the September issue of Wired explores search spam and the role of .info domain names. The article, titled "Spam + Blogs = Trouble" is a good overview of the problems of search spam, blog spam, and other various forms of web activity designed to take advantage of search engines. (The article will be online September 5, but you can read it on page 104 of the print edition that is available to subscribers now). For those not versed in search spam, it's basically creating multiple websites, typically auto-generated by computers, to get good search rankings and then monetize the resulting search traffic through AdSense or affiliate programs. The article focuses much of its attention to splogs, or auto-generated blogs... more
This may or may not come as a shock to some of you, but ICANN's contract with the Domain Name Registrars, in terms of WHOIS inaccuracy is not enforceable. Bear with me. The ability of ICANN to enforce against a Registrar who fails to correct or delete a domain with false WHOIS does not exist. more
Sponsored byRadix
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byCSC
Sponsored byDNIB.com
Sponsored byVerisign