/ Most Commented

Brands Should Not Ignore the Security Benefits of New gTLDs

If one thing has become clear from recent commentary on ICANN's new top-level domain program, it's that there's a dramatic lack of understanding about some of the benefits of owning your own TLD - especially as it relates to security. Many brand owners - especially those with luxury brands - could realize immediate benefits from reduced counterfeiting and greater brand trust with a "dot Brand." more

Death and Your Online Identity

How large is your digital footprint? If you pulled together your email account, web site, blog, social networking accounts, and every other virtual identity you have online, just how well known are you on the Internet? Have you ever stopped to consider what happens to your online identity when you die? How would your online friends know? What would happen to your accounts and your content? more

TLD Domain Abuse: Threat Report - First Half 2011

When it comes to building a robust globe-spanning network of crimeware and making the victims dance to a tune of the cyber-criminals' choosing, you're guaranteed to find domain name abuse at the heart of the operation. DNS provides the critical flexibility and underlying scalability of modern command-and-control (C&C) infrastructure. Cyber-criminals that master DNS (and manage to maintain the stream of new domain registrations that keep it fed) tend to find themselves in command of the largest and most profitable crimeware networks. more

.ECO Top-Level Domain in Danger?

I once wrote about about the legal right objections on Guillon.info and with all these new generic Top-Level Domain (gTLD) announcements, I find it interesting to check if an application could be blocked by paragraph 3.2.2.2 of the latest Draft Applicant Guidebook. more

The Design of the Domain Name System, Part VII - Related Names Are Not Related

In previous installments we've been looking at aspects of the design of the DNS. Today we look at the relationship of similar names in the DNS. A poorly appreciated aspect of the DNS is that there is no inherent relationship between similar looking names. more

The Design of the Domain Name System, Part VI - Overloaded Record Types

In the five previous exciting installments, we've been looking at aspects of the design of the DNS. Today we look at records types, and how you can tell what a DNS record means. All the records in the DNS are strongly typed. Each record includes an RRTYPE, a small number, which defines both the format of the record and what the record means. It is possible and common to have different record types with the same format, but different meanings. more

Mobile: The Major Battleground

Interesting developments in the USA, Australia and New Zealand are giving some insight into the future direction of the mobile industry. In May BuddeComm reported proposed merger between AT&T and T-Mobile as a major threat to competition in the USA. This was viewed as a very obvious issue, and that under normal circumstances such a deal would be rejected by the FCC. But circumstances are no longer normal... more

Seventh Circuit Awards e360 a Whopping $3 in Damages Against Spamhaus - e360 v. Spamhaus

The lawsuit between e360 and Spamhaus was a long-running, tortured affair, and it looks like it finally came to a close. With e360 being awarded a whopping $3 in damages against Spamhaus. ... e360 sued Spamhaus, a UK entity, for damages allegedly resulting from being identified as a "known spammer." It sued Spamhaus for tortious interference and defamation. Spamhaus removed to federal court and asserted lack of personal jurisdiction. more

How a New gTLD Should Choose a Back-end Registry System - Part 2

Deciding how and when to launch a new generic Top-Level Domain (gTLD) or brand Top-Level Domain (TLD) is not unlike deciding to conduct a worldwide tour to key destinations to help boost your marketing efforts. You want to decide what results you expect, who you'll target and what messages you want to send them, as well as study your options and understand them clearly. Only after you've done that do you book your travel plans. more

The Design of the Domain Name System, Part V - Large Data

In the previous four installments, we've been looking at aspects of the design of the DNS. Today we look at the amount of data one can ask the DNS to store and to serve to clients. Most DNS queries are made via UDP, a single packet for query and a single packet for the response, with the packet size traditionally limited to 512 bytes. This limits the payload of the returned records in a response packet to about 400 bytes... more

10/2 & Innovations for Internationalized Domain Names

According to the 10/10 rule, it takes about a decade to take a product from initial idea to having a standard developed, and then another decade to reach mass market adoption. How can that second decade be reduced in the case of Internationalized Domain Names and their adoption by Internet users? The most effective way to speed up IDN mainstream adoption is learning from history. more

Domain Name Registrations Reach 215 Million, 5 Million Added in Q2

The latest Domain Name Industry Brief published by Verisign reports more than 5 million domain names were added to the Internet in the second quarter of 2011, bringing the total number of registered domain names to more than 215 million worldwide across all domains. The increase of 5.2 million domain names marks a growth rate of 2.5 percent over the first quarter. Registrations have grown by more than 16.9 million, or 8.6 percent, since the second quarter of 2010. more

Impact of Hurricane Irene on the Internet

Effects of hurricane Irene were clearly visible in the Internet's global routing table, as tens of thousands of networks were cut off from the rest of the world, according to analysis by Renesys. From the report: "Overall, it seems that the East Coast's power and Internet infrastructure fared pretty well during this storm, with good evidence of restoration after the storm had passed. This is good news, given the important role Twitter now plays in ad hoc rescue coordination, and the importance of the Web for keeping people informed about what they're facing in an emergency situation." more

European Commission Seeking Greater Governmental Control Over the Internet

Kieren McCarthy reporting in .nxt: "An extraordinary series of policy papers drawn up by the European Commission and seen by .Nxt have called for greater governmental control over the Internet's domain name system. ...the measures would provide governments with de facto control over the Internet's naming systems and bring an end to the independent and autonomous approach that has defined the Internet's domain name system since its inception." more

Hiding in Plain Sight: Post-Breach

The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they're frequently compiled from third-hand reports, opinions and technical assumptions. More often than not, they include a discussion about the malware - how advanced it was, etc. - and whether any 0-day vulnerabilities were likely used by the mysterious attacker. more