/ Most Commented

Email in the World’s Languages - Part I

Back when the Internet was young end servers came with shovels (for the coal), everyone on the net spoke English, and all the e-mail was in English. To represent text in a computer, each character needs to have a numeric code. The most common code set was (and is) ASCII, which is basically the codes used by the cheap, reliable Teletype printing terminals everyone used as their computer consoles. ASCII is a seven bit character code, code values 0 through 127, and it includes upper and lower case letters and a reasonable selection of punctuation adequate for written English. more

ICM Registry to Provide Free Malware Scanning for .XXX Domains

ICM Registry announced this week it has struck a deal with McAfee for a free malware scan for every .XXX domain. The deal would include McAfee's "trustmark" and date stamp, ICM said. Every .XXX domain will be scanned for vulnerabilities such as SQL injection, browser exploits and phishing sites, reputational analysis and malware, Stuart Lawley, CEO of ICM Registry, said in a statement. more

Catching Spam Email with Project Honey Pot

Since its launch in October, 2004 Project Honey Pot has made some interesting progress in their war against spam email. The project is a distributed system used to identify spammers and spambots operating across the Internet. To put it simply, Project Honey Pot lays millions of traps around the Internet (66,393,293 as of this writing) baited with specific email addresses that are configured to forward received emails to the Project Honey Pot system. Since these are not email addresses used by real individuals virtually every email received is positively identified as spam. more

New gTLDs: Floodgates for Spammers?

Ever since I heard of the new generic Top-Level Domains (gTLDs), I wondered whether they would be prone to abuse. For example, Microsoft might want to register www.microsoft.microsoft, or Sony might want to register www.sony. But isn't this opening up the floodgates for spammers to register their own domains and squat on them? Why couldn't a spammer register www.cit.ibank? They could then send phishing messages and fool people into clicking very legitimate looking domains. But I don't think this will be a problem. more

ICANN Voting to Pull the Weeds is Good - Pulling Them is Even Better

At the ICANN Public Forum in Singapore yesterday, I likened the ICANN to a community garden: fertile, colorful and above all, worthwhile, but not without a few troublesome weeds. Today's Board vote to adopt the recommendations of the Accountability and Transparency Review Team (ATRT) is a vote to pull those weeds. As good as voting for this weed-pulling exercise is, completing it will be even better. more

Beyond Limitations and What Good It Would Do to ICANN to Operate from Abundance

The ICANN community is conservative. A considerable number of dedicated ICANN volunteers from various constituencies believe that ICANN should follow the unusual logic of limiting its revenues to the levels of its CURRENT estimates of expenditure. The Board, acting on the advise of the ICANN community brought down the ICANN transaction fee per domain name from 25 cents to 16 cents and in the case of numbers, for various reasons the Address Registry fees that it collects from the Regional Internet Registries have been historically kept at a negligibly low level. more

ATRT and the Dog That Didn’t Bark

A favorite Sherlock Holmes story has the detective unraveling the mystery of a murdered horse trainer and the theft of a prized thoroughbred by concentrating on the fact that a dog didn't bark in the night when the horse was stolen. This silence implied for Holmes that it was no stranger who entered the stall. From this he deduced that it was the trainer himself who had removed the horse to fix a race for his profit and that the horse had killed the trainer when he tried to cripple it. ICANN 41 has been afflicted by a similarly curious silence. more

Aged Security Flaw Renews Open/Closed-Source Debate

The recent announcement of a 13-year old security flaw found in an Open Source security library has renewed the debate between open source and closed source software. The library, crypt_blowfish, allows for fast two-way password encryption. The flaw introduces the potential for passwords to be easily compromised and affects PHP and a number of Linux distributions that include the crypt_blowfish library. more

Researchers Use Social Graphs to Detect Spammers, Attackers

A project named S-GPS or Spammer Global Positioning System, by Microsoft researchers uses spammer identification rather than spam identification to identify zombie-based spammers. more

Internet Groups Inaugurate First of Three Cyber Security Facilities

ICANN and internet exchange firm Packet Clearing House (PCH) have joined forces with Infocomm Development Authority of Singapore (IDA) and the National University of Singapore (NUS) to launch the first of three facilities designed to boost the adoption of Domain Name System Security (DNSSEC) among country code Top-Level Domains (ccTLDs). The three new facilities, located in Singapore; Zurich, Switzerland (still under construction) and San Jose, California, provide cryptographic security using the recently deployed DNSSEC protocol. more

Measuring World IPv6 Day - First Impressions

The RIPE NCC took active measurements of World IPv6 Day participants before, during and after World IPv6 Day (in cooperation with CAIDA). We selected 53 participants and performed periodical A and AAAA DNS lookups and HTTP fetches from 40 servers worldwide. For HTTP, we fetched data over IPv4 and IPv6. These provide important control points... more

ICANN Approves New gTLD Program; Applications Accepted January 2012

In what can best be described as a historic decision, today the ICANN Board overwhelmingly approved the new gTLD Program with a vote of 13 to 1 with 2 abstentions. Applications for new gTLDs will be accepted from January 12, 2012 to April 12, 2012. Experts believe that there will likely be hundreds of new applications submitted during this first round. more

End of Cybersquatting? The gTLD Advantage

On the other hand, major dot brand generic Top-Level Domains (gTLDs) are for internal and controlled sub registrations, they would not be open to first come public offerings and therefore it makes no sense for IBM to plan advance purchase of ibm.canon, as Canon, owner of their own gTLD dot canon, unless mutually agreed between two brands, would have no incentive to sell such a registration to a cyber squatter or to anyone else for that matter. more

Minding the GAC and the Heckler’s Veto

ICANN meetings sometimes congeal around a single theme. In San Francisco the theme was captured on clever t-shirts bearing the iconic symbol of the London Underground with the words, "Mind the GAC." Here was a succinct and timely plea for the ICANN Board to pay serious attention to the Governmental Advisory Committee (GAC)'s concerns about new generic Top-Level Domains (gTLDs), rather than to risk undermining the long-term viability of the multi-stakeholder model. more

Bring a Responsible Closure to the New gTLD Process - The Home Stretch

Over the course of the last year, the ICANN Board and Governmental Advisory Committee (GAC) have constructively worked through a long list of their differences contained in the GAC scorecard. As we near the finish line with Monday's scheduled ICANN Board meeting to approve the Applicant Guidebook, there remains a small handful of issues that will hopefully be resolved in a similar responsible manner during Sunday's ICANN Board/GAC consultation. more