/ Most Viewed

RIPE NCC Distributed Last IPv4 Address Space from the Available Pool

On Friday 14 September, 2012, the RIPE NCC, the Regional Internet Registry (RIR) for Europe, the Middle East and parts of Central Asia, distributed the last blocks of IPv4 address space from the available pool. more

Three Things TLD Registries Must Know About China’s Domain Name Regulation

Recently there have been a number of news reports/articles that are incorrect or misleading in interpreting China's domain name management policy. James has posted an article aiming to clarify what is going to in China's domain name market. Considering the potential negative impact of those reports on the participants of this market, I supplement James's post by pointing out three things, which I believe critical for any TLD registries that hope to have a better understand of China's domain name regulation and the special action based on it. more

Increased Attacks Against ISP Networks

Netscout recently released its latest Threat Intelligence Report that documents DDoS attacks in the second half of 2024. As has been the trend for many years, the largest target of DDoS attacks has been ISP networks. There were over 8.9 million DDoS attacks documented in the second half of last year, up 12.75% over the first half of the year. more

2013 Domain Name Year in Review

Well folks, it's that time of year again. It's time for our countdown of the top 10 biggest domain stories for 2013. And while my predictions from last year were accurate, in that we did see a record number of registry and registrar breaches, I had no idea that this year's biggest story would even appear on the list. So with that said, let's get started. more

Local “.city” TLDs as an Opportunity for City Portals

One of the most frequently asked question when it comes to the discussion about a city top-level domain ".city" (such as .london, .berlin or .nyc) is what .city means to the already established official city portal (such as London.gov.uk, Berlin.de, NYC.gov or in general City.com). This article contributes to the most important topics in this discussion... The choices at the top-level available to individuals, companies and regional communities is today limited to country codes (such as .de or .fr) and a very few generic endings (such as .com or .info). Individuals and companies in cities can't really identify with Internet addressing and look for ways to circumvent it. For instance, the term "hamburg" is already used in about 50,000 domains such as www.habour-hamburg.de demonstrably showing that they belong to the Hamburg community. The synonym "nyc" can be found in almost 300,000 domains... more

New Wave of Ransomware Spreading Rapidly Through Russia, Ukrain and Other Nations

A new wave of ransomware called "BadRabbit" is targeting Russia and Eastern Europe, affecting Russian Interfax news agency and reported flight delays at Ukraine’s Odessa airport. more

“Globally, Internet Traffic Passes Through 13 Root Servers” (!)

The Times of India recently interviewed India's Minister of State for Communications and IT, Sachin Pilot, on Internet Governance. Titled "'Internet's governance can't be limited to one geography'", the article started off with an amazing assertion by the minister... While this interview is a fairly standard restatement of the position some Governments (including India) have about governmental control of Internet Governance, it is sadly apparent that the minister unfortunately doesn't appear to understand what the root servers are, or how they work. more

8 Security Considerations for IPv6 Deployment

Feb. 3, 2011, came and went without much fanfare, but it was a milestone for Internet stakeholders, whether they knew it or not. On that Thursday, the last available IPv4 addresses were allocated by the Internet Assigned Numbers Authority (IANA). Though some Regional Internet Registries (RIRs) have a reasonable inventory of IP addresses that could last another year or two, the days of "new" IPv4 address allocations are largely over. more

Security Costs Money. So - Who Pays?

Computer security costs money. It costs more to develop secure software, and there's an ongoing maintenance cost to patch the remaining holes. Spending more time and money up front will likely result in lesser maintenance costs going forward, but too few companies do that. Besides, even very secure operating systems like Windows 10 and iOS have had security problems and hence require patching. (I just installed iOS 10.3.2 on my phone. It fixed about two dozen security holes.) more

Fifth Publication of the UN ICT Task Force Series

The following is the introductory excerpt from the United Nations ICT Task Force's recently published "Internet Governance: A Grand Collaboration". This publication offers a collection of works from the March 2004 meeting. more

Survey: Cloud Computing ‘No Hype’, But Fear of Security and Control Slowing Adoption

Contrary to conventional wisdom, the vast majority of business and IT executives report that cloud computing is a viable technology option that can improve a company's bottom-line results according to a new global survey conducted by an independent market research firm. However, despite growing evidence that cloud-based systems have the potential to lower costs, the majority of companies report no plans to integrate cloud computing in the next 12 months... more

How the First White House Website Came to Be

In doing a recent search, there it was: the first White House website archived at the U.S. Archives. It ended up changing the direction of markets and network development, if not world politics. How it came to be is known only to the few people involved. It is a great example of individual initiative, collective whimsy, serendipity, and unintended consequences... When Bill Clinton arrived at the White House on 20 January 1993, he brought with him a kind of rag-tag team who had helped him get there.  more

Every Domainer Is Subsidizing Tasting… Abolish Registration Grace Period

One issue that a large number of domainers agree on is that domain tasting under the current ICANN-approved policy is bad for the industry. For one thing, a healthy portion of the practice involves trademark use that not only is illegal but also destroys value. Of course, particular segments of the domain name ecosystem can suffer value destruction because of tasting that doesn't infringe trademarks. But most criticism is directed, and rightly so, at tasting that raises trademark issues. Litigation over the trademark issues has done little to stop the practice and destroys value for trademark holders and domainers alike... more

New Trend: Vanity IPv6 Addresses

It's like a vanity license plate, but for your IP address. Previously under IPv4 DNS registration, users were limited to only using numbers. However, with the height of IPv6 underway users are getting creative with their newfound use of characters. Although you can only use characters A-F, it only takes a little creativity to find ways around this. more

Should the Government Prepare a Preemptive Cyber-Attack?

The House Committee on Science recently held a hearing to "examine the extent of U.S. vulnerability to cyber attacks on critical infrastructure such as utility systems, and what the federal government and private sector are doing, and should be doing, to prevent and prepare for such attacks." Specific issues addressed at the hearing included whether: 1) the U.S. is able to detect, respond to, and recover from cyber-attacks on critical infrastructure; and 2) is there a clear line of responsibility within the federal government to deal with cybersecurity... more