Guest Post: DNS over TLS brings reliable delivery of the DNS, which might make DNSSEC and DANE finally happen after all.
Guest Post: Study takes a brief peek at 3.5 billion queries from Google’s public DNS service.
Guest Post: Technology developments such as Coherent Optics have allowed us to get closer to the theoretical transmission capacity of submarine cables.
Guest Post: Learn about the basics of nibble boundaries and how to calculate subnets outside of them.
Guest Post: Looking back on past forecasts for the DNS exposes how far it has evolved from its preliminary tasks.
APNIC will soon implement an important change to the aut-num object in the APNIC Whois Database.
Guest Post: NTT Secure Platform Laboratories has discovered five previously unknown evasion techniques by using two types of honeyclients.
Guest Post: Using RPKI ROAs as if they are IRR route(6)-objects is a transitional step towards increased security in the routing ecosystem.
Best practice document assists with configuring routers for connecting to IXes.
Guest Post: The SISSDEN project operates a network of honeypots that detect on average around 10,000 amplification DDoS attacks per day.