/ Recently Commented

How a New gTLD Should Choose a Back-end Registry System - Part 2

Deciding how and when to launch a new generic Top-Level Domain (gTLD) or brand Top-Level Domain (TLD) is not unlike deciding to conduct a worldwide tour to key destinations to help boost your marketing efforts. You want to decide what results you expect, who you'll target and what messages you want to send them, as well as study your options and understand them clearly. Only after you've done that do you book your travel plans. more

The Design of the Domain Name System, Part V - Large Data

In the previous four installments, we've been looking at aspects of the design of the DNS. Today we look at the amount of data one can ask the DNS to store and to serve to clients. Most DNS queries are made via UDP, a single packet for query and a single packet for the response, with the packet size traditionally limited to 512 bytes. This limits the payload of the returned records in a response packet to about 400 bytes... more

10/2 & Innovations for Internationalized Domain Names

According to the 10/10 rule, it takes about a decade to take a product from initial idea to having a standard developed, and then another decade to reach mass market adoption. How can that second decade be reduced in the case of Internationalized Domain Names and their adoption by Internet users? The most effective way to speed up IDN mainstream adoption is learning from history. more

Domain Name Registrations Reach 215 Million, 5 Million Added in Q2

The latest Domain Name Industry Brief published by Verisign reports more than 5 million domain names were added to the Internet in the second quarter of 2011, bringing the total number of registered domain names to more than 215 million worldwide across all domains. The increase of 5.2 million domain names marks a growth rate of 2.5 percent over the first quarter. Registrations have grown by more than 16.9 million, or 8.6 percent, since the second quarter of 2010. more

Impact of Hurricane Irene on the Internet

Effects of hurricane Irene were clearly visible in the Internet's global routing table, as tens of thousands of networks were cut off from the rest of the world, according to analysis by Renesys. From the report: "Overall, it seems that the East Coast's power and Internet infrastructure fared pretty well during this storm, with good evidence of restoration after the storm had passed. This is good news, given the important role Twitter now plays in ad hoc rescue coordination, and the importance of the Web for keeping people informed about what they're facing in an emergency situation." more

European Commission Seeking Greater Governmental Control Over the Internet

Kieren McCarthy reporting in .nxt: "An extraordinary series of policy papers drawn up by the European Commission and seen by .Nxt have called for greater governmental control over the Internet's domain name system. ...the measures would provide governments with de facto control over the Internet's naming systems and bring an end to the independent and autonomous approach that has defined the Internet's domain name system since its inception." more

Hiding in Plain Sight: Post-Breach

The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they're frequently compiled from third-hand reports, opinions and technical assumptions. More often than not, they include a discussion about the malware - how advanced it was, etc. - and whether any 0-day vulnerabilities were likely used by the mysterious attacker. more

ICANN Seeking Global Background Screening Services for New gTLD Applicants

ICANN is seeking a global background screening service provider in order to conduct a "thorough and timely" background check on all new generic Top-Level Domain (gTLD) applicants. The Request for Proposal recently issued by ICANN aims at background screening focused on general business diligence, criminal history, and cybersquatting behavior. more

Five Countries are Considering Anti-Spam Laws

The international press is alight with reports of various countries considering privacy and anti-spam legislation. It appears that many countries have arrived at the logical conclusion that after years of supposed 'self regulation'; some marketers must be brought to heel by way of regulation and law, to stop abusive practices. more

The ICANN Registrar Community

It started way back in 1993 with a Cooperative Agreement with the US Government and Network Solutions, making them registrar 'numero uno'. At that time, they enjoyed a monopoly of the market and the much envied ability to charge $70 for a 2 year registration. As all good things come to an end (for NetSol), the agreement was amended in October 1998 to introduce a more competitive spirit. more

The Design of the Domain Name System, Part IV - Global Consistency

In the previous installments, we've been looking at aspects of the design of the DNS. Many databases go to great effort to present a globally consistent view of the data they control, since the alternative is to lose credit card charges and double-book airline seats. The DNS has never tried to do that. The data is roughly consistent, but not perfectly so. more

The Design of the Domain Name System, Part III - Name Structure and Delegation

In the previous installments, we looked at the overall design of the DNS and the way DNS name matching works. The DNS gains considerable administrative flexibility from its delegation structure. Each zone cut, the place in the DNS name tree where one set of DNS servers hands off to another, offers the option to delegate the administration of a part of the DNS at the delegation point. more

Spam Is on the Decline; What Are the Implications?

Previously, I wrote that the total amount of spam that we are seeing has seen a significant decline over the past year and a half. What does this mean in real terms? Are we finally winning the fight against spam? There are multiple angles. On the one hand, processing spam takes significant system resources... more

Protecting Yourself from Spear Phishing

One of the big trends this year is spear phishing. These are phish attacks that are frequently (though not always) against high profile users. The purpose of these attacks is to steal sensitive data or get elevation of privilege inside the service by exploiting a software vulnerability within the user's computer that transmits usernames and passwords back to the phisher. more

The Design of the Domain Name System, Part II - Exact and Approximate Name Matching

In the previous installment, we looked at the overall design of the DNS. Today we'll look at the ways it does and does not allow clients to look up data by name. The most important limitation of the DNS, compared to other databases, is that it only does exact match lookups. That is, with a few minor exceptions, the name in the query has to match the name of the desired records exactly. more