/ Most Viewed

How to .DOWNLOAD Banging Tunes, Sick Movies and Nasty Apps

TeenSpeak is being rivalled by GeekSpeak: most Internet Geeks know what "the cloud" is. They know because they are "Internet Geeks", most Internet users don't profess to the same level of 'Geekdom'. Now while I don't claim to be an Internet Geek, I do like to think of myself as an educated Internet user; and the way I think of "the Cloud" is of a computer, plugged in somewhere, and holding lots of "computer things" for the use of anyone, anywhere. You may have heard the expression: "it is hosted in the cloud". more

Preventing Future Attacks: Alternatives In DNS Security Management - Part I

The October 21 DDoS attacks against the 13 root-name servers containing the master domain list for the Internet's Domain Name System (DNS), (which reportedly took offline 9 of the 13 servers) remain a clear and daunting reminder of the vulnerabilities associated with online security. Many DNS authorities have named the most recent hit the largest DDoS attack against the root server system. Chris Morrow, network security engineer for UUNET, the service provider for two of the world's 13 root servers, recently told The Washington Post... more

DNS Wars

The North American Network Operators' Group (NANOG) is now quite an institution for the Internet, particularly in the North American Internet community. It was an offshoot of the Regional Techs meetings, which were part of the National Science Foundation Network (NSFNET) framework of the late 80s and early 90s. NANOG has thrived since then and is certainly one of the major network operational forums in today's Internet – if not the preeminent forum for network operators for the entire Internet. more

Seventh Circuit Awards e360 a Whopping $3 in Damages Against Spamhaus - e360 v. Spamhaus

The lawsuit between e360 and Spamhaus was a long-running, tortured affair, and it looks like it finally came to a close. With e360 being awarded a whopping $3 in damages against Spamhaus. ... e360 sued Spamhaus, a UK entity, for damages allegedly resulting from being identified as a "known spammer." It sued Spamhaus for tortious interference and defamation. Spamhaus removed to federal court and asserted lack of personal jurisdiction. more

New gTLD Expressions of Interest: Proceed with Caution

The ICANN Board, at its October 2009 annual meeting in Seoul, passed a resolution directing staff to prepare an analysis regarding the feasibility of ICANN soliciting Expressions of Interests (EOIs) from prospective applicants for new Generic Top Level Domains (gTLDs)... While this latest initiative should not distract ICANN from the remaining four overarching issues, if well executed, this EOI initiative could provide valuable insights into two of the four overarching issues: economics and root scaling. more

The Internet Must Remain Open - Even for Those We Disagree With

Over the past couple of weeks, following the events in Charlottesville, Virginia, there has been significant discussion in social and traditional media about various technology companies removing websites from their servers, or otherwise making them unavailable. As the operators of Canada's Internet domain, we at CIRA are getting numerous inquiries about our stance and policies on this issue. I'd like to use this opportunity to make a couple of clarifications about how CIRA works and what CIRA actually does. more

CircleID’s Top 10 Posts of 2007

Here is a list of the most viewed news and blog postings that were featured on CircleID in 2007. Best wishes for 2008. more

How Can ICANN Improve Institutional Confidence?

This week ICANN held a public consultation in Washington, D.C., where ICANN's President's Strategy Committee (PSC) solicited remarks from a packed audience of intellectual property (IP) lawyers, domain name registrars and other Internet stakeholders on how the organization can improve institutional confidence. No surprise, ICANN's decision to add new generic top-level domains (gTLDs) to the Internet was on many participants' minds. more

Dictionary Words Alone or Combined Functioning as Trademarks Are No Less Dictionary Words

By definition "any word" or "any combination of words" can function as trademarks, but whether alone or combined for that purpose no use can overrule their ordinary meanings, support their removal from the public domain, or prevent speculation or use of identical or confusingly similar words by businesses other than rights holders. The fact is, all words that are not coined found in dictionaries, word lists, and circulating in world cultures are generic. more

The Design of the Domain Name System, Part V - Large Data

In the previous four installments, we've been looking at aspects of the design of the DNS. Today we look at the amount of data one can ask the DNS to store and to serve to clients. Most DNS queries are made via UDP, a single packet for query and a single packet for the response, with the packet size traditionally limited to 512 bytes. This limits the payload of the returned records in a response packet to about 400 bytes... more

Court Denies Preliminary Restriction of WLS

In a strongly worded ruling, a U.S. Federal Court Judge has ruled in ICANN's favor and denied plaintiffs' motion for preliminary injunction. Dotster and two other ICANN accredited registrars had asked the court for an order prohibiting ICANN from finalizing approval of VeriSign's proposed new "Wait Listing Service" (WLS). Plaintiffs alleged that WLS is "anti-competitive" and that ICANN breached its obligations under the registrar accreditation agreement (RAA) when ICANN gave preliminary approval to WLS last year. The court disagreed, ruling [PDF] as follows: more

Over a Billion Email Addresses of Major Spam Operation Exposed via Unprotected Backups

A spamming group called River City Media (RCM) has had its database of 1.4 billion records leaked. This was revealed today by MacKeeper Security Researcher, Chris Vickery in cooperation with CSO Online and Spamhaus. more

Combinations of Dictionary Words in Domain Names: Common vs. Distinctive Phrases

The lexicon of domain names consists of letters, words, numbers, dots, and dashes. When the characters correspond in whole (identical) or in part (confusingly similar) to trademarks or service marks and their registrations postdate the first use of marks in commerce registrants become challengeable under the Uniform Domain Name Dispute Resolution Policy (UDRP) as cybersquatters. more

Chinese Hackers and Cyber Realpolitik

For many people the comments made by Michael Hayden, Former Director of the Central Intelligence Agency, at this week's Black Hat Technical Security Conference in Abu Dhabi may have been unsettling as he commented upon the state of Chinese cyber espionage. I appreciate the candor of his observations and the distinction he made between state-level motivations. In particular, his comment... more

Why Don’t GAC Representatives Follow Their Own National Law?

A few weeks ago ICANN's domain name policy making organ (the GNSO) decided that the purpose of Whois was domain name coordination and not compulsory surveillance of domain name registrants. The US and Australian governments expressed their opposition. The US government's lack of concern for privacy is well known. But what about Australia? The Australian ICANN Governmental Advisory Committee (GAC) representative, Ashley Cross, tried to use his authority as "a government" to intimidate the GNSO, sending it a message announcing that "Australia" supports a broader definition of Whois purpose that gives ICANN a blank check... What does "Australia" really support, however? more