Securing Internet geolocation: Server Location Verification
Guest Post: Guarding against server impersonation attacks using Server Location Verification.
Guest Post: Guarding against server impersonation attacks using Server Location Verification.
Guest Post: Protecting Internet geolocation services from manipulation using Client Presence Verification.
Guest Post: According to a new study, peer-to-peer updates are an essential part of future management tools, as the only way to get effective and scalable connectivity.
Guest Post: There are limits to the benefits HTTPS provides, even when deployed properly.
APNIC was among the 800 participants at LACNIC 29, held in Panama City, Panama from 30 April to 4 May 2018.
Geoff Huston delves into the statistics to test common theories on the deployment of IPv6. Are they true?
Last week’s Internet and IPv6 security workshop in Bangkok was the latest in a string of partnership initiatives between APNIC and the ITU in the Asia Pacific.
Guest Post: Despite popular belief, IPv6 multihoming is possible. Find out how.
Guest Post: Leveraging end hosts is an efficient way to monitor the health of a network, compare performances across providers, and quickly spot issues.
Guest Post: Learn how one unsuspecting subdomain owner managed to serve 390,000+ PDF books without any servers being compromised.