Our systems are protected by state of the art security systems. Our SPAM filter is a hardware device that is nearly 100% effective. It also helps in protecting against Spyware and other malicious code. Our Firewall is similar to those you would find in large corporations. Our Anti-Virus system has served us well and we've not had problems with virus for years. ...Two weeks ago, I received approximately twenty e-mails requesting the review and approval of Defending The Net articles published on other sites. I thoroughly review the e-mails to make sure they seem legitimate... more
For me, one of the more interesting sessions at the recent IETF 81 meeting in July was the first meeting of the recently established Homenet Working Group. What's so interesting about networking the home? Well, if you regard challenges as "interesting", then just about everything is interesting when you look at networking in the home! more
A few days ago, Eric Goldman wrote an interesting thinkpiece in CircleID regarding users' feeling about privacy. He seems to conclude that the existent regulations and policies on the matter are unnecessary, since Privacy doesn't "really" matters to the consumer. Eric based his argumentation on a number of surveys, stating that, even when the user expresses concerns about their privacy, on line behavior shows a different reality. We don't want to discuss here the soundness of surveys as a reliable source of information, but the author could be assuming too much in his analysis. more
In 2014, computer scientist Gavin Wood coined the term "Web 3.0." The phrase, which has now been shortened to "Web3", refers to the third generation of the internet that's designed to be truly decentralised and free from a central authority. Web3 has the potential to add real-world value for businesses by creating additional avenues to reach consumers. However, owing to its less regulated nature, brands also have the potential to be taken advantage of both by users and by the providers in the space. more
NTIA issued a Request for Comments today asking for broad input from "all interested stakeholders, including private industry, academia, civil society, and other security experts," on actions against botnets and distributed attacks. more
As the FCC moves forward with its plans to regulate the internet in the U.S., it's worth taking a look at what's happened when the government has regulated other innovative industries. As a facilitator of innovation, I've always been fascinated with the history of Bell Labs. Bell Labs was once thought of as the source of most modern innovations... The work done at Bell Labs built the foundation for modern invention leading to phones, space exploration, the internet, music distribution, cell phones, radio and television and more. more
Since the inception of ITU precursors in 1850, its various bodies have treated the subject of telecommunication network security as both an obligation of signatories to the treaty instruments as well as an ongoing collaborative activity. However, what it actually did in those activities was constrained by its jurisdiction and participant competency -- which encompassed international public telecommunication services provided primarily by designated government agency service providers known as PTTs. more
When it comes to fighting cybercrime, "being able to easily access ICANN and look up IP addresses is a lot more important than accessing the minutiae of encrypted data communications," says Jacqueline McNamara, head of cybersecurity at Telstra. more
Coninsiding with October Cybersecurity Awareness Month, Google today announced the launch of Advanced Protection Program specifically "designed for those who are at an elevated risk of attack." more
To date, most of the discussion on net neutrality has dealt with the behaviour of conventional wireline ISPs. RCR Wireless News is carrying an opinion piece called "Paying for the bandwidth we consume" by Mark Desautels, VP -- Wireless Internet Development for CTIA -- the trade association for the US wireless industry. His article follows up on reports of Comcast cable moving to discontinue internet access service to so-called "bandwidth hogs"... more
The Best Practice Forum (BPF) on IPv6 at the Internet Governance Forum (IGF) explored what economic and commercial incentives drive providers, companies and organizations to deploy IPv6 on their networks and for their services. The BPF collected case studies, held open discussions online and at the 2016 IGF meeting, and produced a comprehensive output report. This article gives a high-level overview. more
Geoff Huston's recent post about the rise of DNS amplification attacks offers excellent perspective on the issue. Major incidents like the Spamhaus attack Geoff mentions at the beginning of his post make headlines, but even small attacks create noticeable floods of traffic. These attacks are easy to launch and effective even with relatively modest resources and we see evidence they're occurring regularly. Although DNS servers are not usually the target of these attacks the increase in traffic and larger response sizes typically stress DNS infrastructure and require attention from operation teams. more
The IPv6 Forum, the North American IPv6 Task Force, and Charmed Technology, Inc. today announced that the U.S. IPv6 Summit 2003 will be held December 8 - 11, 2003 in Arlington, VA, at the Doubletree Crystal City. The U.S. IPv6 Summit 2003 will focus on deployment, technical depth of key IPv6 features, and applications or services of Internet Protocol version 6 (IPv6). more
IPv6 is in the news because the mainstream media have started to pick up the fact that IPv4 will be fully allocated in the next two or three years. And IPv6 deployment is important if we want to keep the Internet growing sustainably. So where is IPv6 deployment most evident? more
AI has revolutionized how we process information, optimize tasks, and conduct research. However, its integration into academia sparks ethical and practical debates. Should we limit its use? How can we assess a student's true knowledge if they employ these tools? This text explores these questions from the perspective of a technology expert who argues that banning AI is as absurd as rejecting calculators or spreadsheets in the past. more