15 years to the end of the world as Unix knows it
Is Y2038 the new Y2K?
Is Y2038 the new Y2K?
Guest Post: How to improve the use of RIPE Atlas APIs.
Guest Post: Understanding the complexity, trust relationships, and tradeoffs of certificates can lead to better decision-making and more efficient operations.
Adli Wahid shared his experiences in cybersecurity development at the TaiwanICDF and USAID Workshop on National Cybersecurity Strategies, held in Suva, Fiji from 27 to 29 March 2023.
Guest Post: Observing zombie-like behaviour in real time and taking a closer look.
If the risks aren’t fully understood, LEO Internet could be a wasted once-in-a-lifetime opportunity.
NTP security, transition mechanisms, TCP delayed ACKs, alternate name systems, and more from IETF 116.
APNIC conducted training and presented on IPv6 and the historical resources transition at NZNOG 2023, held in Rotorua, New Zealand from 20 to 24 March 2023.
Guest Post: Revisiting the adoption of Query Name Minimization for improved DNS security and privacy.
Vivek Nigam presented on RPKI invalids at INNOG 6, held in Delhi, India from 22 to 26 March 2023.