/ Most Viewed

SQL Injection in the Wild

As attack vectors go, very few are as significant as obtaining the ability to insert bespoke code in to an application and have it automatically execute upon "inaccessible" backend systems. In the Web application arena, SQL Injection vulnerabilities are often the scariest threat that developers and system administrators come face to face with (albeit way too regularly). more

Rape in the DNS

It took three years for ICANN to issue a breach notice to BizCn over the invalid WHOIS record behind RAPETUBE[DOT]ORG. Throughout the history of this absurd case ICANN staff would repeatedly insist the record had been validated and the registrar was compliant, regardless of extensive evidence proving otherwise. Despite a letter sent to ICANN's CEO and an investigation by the Washington Post, the Rape Tube stayed online. more

Social Networking and Web 2.0 Creating DNS Performance Issues for Carriers

A revolution is taking place on the Internet, with new sites redefining how we interact online. The next-generation Internet is emerging in collaborative and interactive applications and sites with rich, varied media (images, video, music). As with many revolutions, this one is driven by the younger generation, which is adopting social networking sites like MySpace and video sharing sites like Google's YouTube. But the general shift is not restricted to the young, as more mature consumers and businesses alike are exploring the possibilities of collaborative, media-rich applications. This major shift in Internet applications has its unintended victims. One of them turns out to be the Domain Name System (DNS). more

Technical Community Calls for Stronger, Smarter Internet Governance in New Global Report

As industry watchers know, the UN's World Summit on the Information Society (WSIS+20) review marks a pivotal moment that will shape internet governance well into the 2030s and beyond. In response, the team at CIRA has published a new report, emphasizing why the multistakeholder model should not only be protected, but refreshed and reinvigorated for the challenges that lie ahead. more

8 Reasons Why Cybersecurity Strategy and Business Operations are Inseparable

In modern society, there is one fact that is unquestionable: The hyper-connectivity of the digital economy is inescapable. A financial institution without an online presence or omni-channel strategy will cease to be competitive. Universities (for-profit or non-profit) must develop and continuously evolve their online learning capabilities if they are to stay relevant. Online retailers are quickly outpacing and rendering their 'brick-and-mortar' counterparts irrelevant. more

She Gave Me a Fake Phone Number!

The Intellectual Property Constituency, meeting at the ICANN conference in Vancouver, was interested in increasing ICANN's budget not because they thought they deserved it, but because they wanted ICANN to actually enforce the rules on the books about fake registrations. Now there's some evidence about how prevalent that is. If there's any surprise here, it's that the numbers are so low. more

Two New Chinese Internet Service Constellations and Their Market

China’s plans for low-Earth orbit Internet service constellations began with two projects, Hongyun (156 satellites) and Hongyan (864 satellites). These were eventually sidelined for Guowang, an ambitious, 12,992 satellite constellation that is expected to begin launching satellites this year. But, that is old news. China’s five-year plan designates satellite Internet as a strategic emerging industry and two new constellations have emerged, G60 (12,000 satellites) and Honghu–3 (10,000 satellites). more

Microsoft’s Contribution Was TCP/IP

There's a fascinating blog discussion going on here, here and here. The conversation is around Marc Andreessen's refusal to trash Microsoft and Bill Gates on stage. Andreessen points to the way in which the company drove the industry forward in the 1990's, and Mathew Ingram says "love them or hate them, at least Microsoft standardized the operating-system market"... more

JET Guidelines for Internationalized Domain Names

It is difficult to explain RFC 3743 or commonly known as the Joint Engineering Team (JET) Guidelines without some lesson on Chinese, Japanese and Korean (CJK), particularly how it relates to Internationalized Domain Names (IDN). Luckily, an Internet-Draft we wrote back in 2001 discusses the issues quite neatly in this context. In brief, Chinese characters (Hanzi) or Han ideographs are evolved from pictographs (writing made up of pictures) across thousands of years. Unlike other writing systems, Han Ideographs are constantly evolving.  more

Measuring IPv6 - Country by Country

Some years ago a report was published that ranked countries by the level of penetration of broadband data services. You can find the current version of that report at the OECD web site. This ranking of national economies had an electrifying impact on this industry and upon public policies for broadband infrastructure in many countries. Perhaps this happened because there were some real surprises lurking in the numbers at the time. more

Phishers Now Targeting Domain Registrars

This is an issue of some concern and should be watched carefully: phishers are now trying to get passwords of domain registrants (domain owners). Currently, correspondents inform me that GoDaddy is the target, but there's no reason to think the phishers won't expand to other registrars. Normally, phishers go after bank accounts or other financial information, or sometimes the online accounts of users so that they may send spam. It's not known precisely why phishers are after domain registration information, but the possibilities are chilling... more

U.S. Government to Retain Oversight of the Internet’s Root Servers

The U.S. government has announced today that it will indefinitely retain oversight of the Internet's root servers, ignoring pervious calls by some countries to turn the function over to an international body. more

Should WSIS End? A Call for Discussion

The future of the World Summit on the Information Society (WSIS) process will be one of the main topics of the 2025 Internet Governance Forum. Many in the IG community are heavily invested in the renewal of WSIS. They imply that if it is not renewed, there will be major, negative effects on the way we govern the Internet. IGP believes that it is healthy and productive for the community to consider the possibility of ending WSIS. more

A Simulation of the SpaceX, Amazon, Telesat and OneWeb Broadband Satellite Constellations

Over two years ago, an MIT research group ran a simulation of the low-Earth orbit broadband constellations of OneWeb, SpaceX, and Telesat, and last January they repeated the simulation updating with revised constellation characteristics and adding Amazon's Project Kuiper. They ran the new simulation twice, once using the planned initial deployments of each constellation and a second time using the configuration shown. more

Analysis of Domain Names Registered Across Multiple Existing TLDs and Implications for New gTLDs

The following is an analysis based on the hypothesis that trademark holders are not, in general, registering their trademarks as domain names across the existing top-level domain namespace. To determine if the hypothesis is true, we examine domain names registered in the popular generic top-level domains ("gTLDs" such as .com, .net and .info), also using other publicly available information such as the USPTO database of trademarks, the English dictionary, DNS entries, UDRP records and whois records. more