Guest Post: As networks grow in size and complexity, operators find themselves needing an increasing array of tools to manage the flow of traffic.
Has the use of elliptical curve cryptographic algorithms in generating digital signatures for securing the DNS improved since 2014?
A trustable DNS demands DNSSEC irrespective of the fate of DNS over TLS.
Guest Post: DNS over TLS brings reliable delivery of the DNS, which might make DNSSEC and DANE finally happen after all.
Guest Post: Study takes a brief peek at 3.5 billion queries from Google’s public DNS service.
Guest Post: Technology developments such as Coherent Optics have allowed us to get closer to the theoretical transmission capacity of submarine cables.
Guest Post: Learn about the basics of nibble boundaries and how to calculate subnets outside of them.
Guest Post: Looking back on past forecasts for the DNS exposes how far it has evolved from its preliminary tasks.
APNIC will soon implement an important change to the aut-num object in the APNIC Whois Database.
Guest Post: NTT Secure Platform Laboratories has discovered five previously unknown evasion techniques by using two types of honeyclients.