/ Most Viewed

Is ICANN Producing Jewels?

Excavation is fun. You get to rumble around on heavy equipment bashing up this and tearing up that. Each scoop uncovers original earth. As your big machine chews up the hill, an occasional sparkle suggests a raw gem or two. ...ICANN business is still predominately conducted on Email lists/forums. Email lists and forums are good at excavating... more

SpaceX Reports Significant Broadband Satellite Progress

SpaceX delayed last Wednesdays Starlink launch due to high winds and on Thursday they decided to do a software update and postpone the launch until next week, but they revealed significant progress in their Starlink mission press release and in tweets by and a media call with Elon Musk. The mission press release said SpaceX has significantly reduced the size and weight of their satellites. more

Watching North Korea’s Internet Connectivity Go Up and Down Via Twitter

One thing I enjoy about following Dyn Research (formerly Renesys) on Twitter is that they provide quite interesting graphics and charts about Internet outages. They've been tracking North Korea's Internet access quite closely over the past week and their tweets have been quite enlightening. Back on December 22, for instance, DynResearch tweeted a chart showing a 9-hour, 31-minute outage... more

Spamford Wallace Gets Sued Yet Again

If there were a lifetime achievement award for losing lawsuits for being annoying, Sanford Wallace would be a shoo-in. Fifteen years ago, his junk faxing was a major impetus for the TCPA, the law outlawing junk faxes. Later in the 1990s, his Cyber Promotions set important legal precedents about spam in cases where he lost to Compuserve and AOL. Two years ago, he lost a suit to FTC who sued his Smartbot.net for stuffing spyware onto people's computers. And now, lest anyone think that he's run out of bad ideas, he's back, on the receiving end of a lawsuit from MySpace... more

RIAA Loses Again: No Legal Wins Against P2P File Sharers So Far

The Recording Industry Association of America (RIAA) has been taking a lot of people to court -- basically, harassing folks in an attempt to curb file-sharing. The $220,000 verdict against Jammy Thomas got a lot of news (and probably worried a lot of folks). However, on appeal (i.e., after a new court not cherry-picked by the RIAA to try the case looked things over), the RIAA lost... again. ...At its heart, the verdict reaffirms that simply making a copyrighted work available is not the same as actually distributing the work. more

China’s First IPv6-Only Backbone Network Connecting 1,200 More Campuses

2016 marked the start of the third and final phase of the China Next Generation Internet (CNGI) IPv6 program. more

What If I Were Wrong About Edge-Caching?

Nicholas Thompson at Wired Blog sums up yesterday's Wall Street Journal piece on Google. To summarize his summary: Google's edge caching isn't new or evil; Lessig didn't shift gears on NN; Microsoft and Yahoo have been off the NN bandwagon since 2006; The Obama team still supports NN; Amazon's Kindle support is consistent with its NN support. Yet... yet... more

Thick Whois Policy for .COM Goes Live

"The domain name industry is kicking off one of its most fundamental shifts in its plumbing this week," Kevin Murphy reporting in Domain Incite. more

Zango Verdict is Good News for Spam Filters and Blacklists

Zango, a company that used to be called 180 solutions, has a long history of making and distributing spyware. (See the Wikipedia article for their sordid history.) Not surprisingly, anti-spyware vendors routinely list Zango's software as what's tactfully called "potentially unwanted". Zango has tried to sue their way out of the doghouse by filing suit against anti-spyware vendors. In a widely reported decision last week, Seattle judge John Coghenour crisply rejected Zango's case, finding that federal law gives Kaspersky complete immunity against Zango's complaint... more

Do I need DDoS protection? A Realistic Look at the Decision Process

There has been a recent spate of well publicised Distributed Denial of Service (DDoS) attacks that bring websites down and render them useless, including Evernote and most recently Feedly. In light of this, here are some comments and tips to help companies evaluate and prepare not to be held for ransom or suffer lost reputation and sales as a result. more

Tracking the Line that Separates Cybersquatting from Trademark Infringement

The Uniform Domain Name Dispute Resolution Policy (UDRP) is a rights protection mechanism crafted by the World Intellectual Property Organization (WIPO) and adopted by the Internet Corporation for Assigned Names and Numbers (ICANN) for trademark owners to challenge the lawfulness of domain name registrations. Cybersquatting or abusive registration is a lesser included tort of trademark infringement, and although the UDRP forum is not a trademark court, as such, in some ways it is since it empowers (assuming the right alignment of facts) to divest registrants of domain names that infringe a complainant's trademark rights. more

Canada’s Anti-Spam Law Coming Into Force July 01, 2014

Canada's Anti-Spam Law, CASL, is now a done deal. Last Thursday, Treasury Board of Canada President (and champion of CASL) Tony Clement approved Industry Canada regulations in their final form. Today, Minister of Industry the Honourable James Moore announced CASL will come into force in July 1, 2014. more

Overcoming Cloud Storage Security Concerns: 7 Key Steps

According to a 2013 TwinStrata survey, 46 percent of organizations use cloud storage services and 38 percent plan to adopt this technology in the near future. Cloud storage capacity demands are increasing 40 to 60 percent year-over-year, while storage density lags behind at 20 percent. The result? More data, growing demands for space and increasing security concerns. How do enterprises overcome cloud storage security challenges? more

IP Addresses and Traceback

This is an informal description the evolution of a particular area of network forensic activity, namely that of traceback. This activity typically involves using data recorded at one end of a network transaction, and using various logs and registration records to identify the other party to the transaction. Here we'll look at the impact that IPv4 address exhaustion and IPv6 transition has had on this activity, and also note, as we explore this space, the changing role of IP addresses within the IP protocol architecture. more

ICANN’s New gTLD Process: Hype and Reality

At its 32d International Junket Meeting last week, ICANN's Board approved the GNSO Council's recommendations for the eventual addition to the root of new generic top-level domains (gTLDs). This means that eventually, when the staff drafts, community comments upon, and Board approves implementation processes, those with deep pockets will have the opportunity to bid for new TLD strings... more