You are here: > Resources > Computers & Information Technology > Internet General (see also Fraud, Free Speech, etc.) > Internet: Infrastructure / Domain Names

Internet: Infrastructure / Domain Names

Search only Internet: Infrastructure / Domain Names, and everything underneath:

Articles and Resources

154 Articles and Resources. Go to:  [Next 50]   [End]

Date Resource Read it at:
Oct 28, 2013 Mozilla sheds a light(beam) on Web privacy: Lightbeam plug-in for Firefox shows who's watching when you log into your favorite sites, encourages users to anonymously submit tracking data

QUOTE: [Lightbeam for Firefox] add-on shows, graphically, how the sites you visit interact with other sites -- and how tracking information may be gathered in the process, often from multiple sites at once without your knowledge.

Sep 26, 2013 Is Yahoo Doing Enough To Protect Sensitive Emails?

QUOTE: ...Yahoo announced that it would give away inactive email addresses and Yahoo IDs. They would only do so if the address had been inactive for at least a year. The idea was that Yahoo’s loyal users would be able to get more desirable email addresses....People began criticizing Yahoo’s move pretty much right after it was announced in early summer. Security experts warned of privacy and cybersafety issues that could arise from the initiative.

Sep 05, 2013 N.S.A. Foils Much Internet Encryption

QUOTE: The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world...

New York Times
Mar 14, 2012 Domain seizures for copyright infringement likely to go global

QUOTE: Efforts to take down websites for copyright infringement are likely to move beyond U.S.-based registries, with ICANN (the Internet Corporation for Assigned Names and Numbers) promising to more closely cooperate with global law enforcement agencies and governments.

Feb 29, 2012 Stop the ‘Do Not Track’ Madness

QUOTE: There are certainly aspects of our lives where genuinely intrusive practices can have serious detrimental impacts. But with so much in our world that needs attention, a misguided focus on web advertising personalization is not only irrational, but could ultimately undermine the “free services” basis of the web in ways that we could very soon come to severely regret.

Feb 09, 2012 Texas Jury Strikes Down Patent Troll’s Claim to Own the Interactive Web

QUOTE: The chief issue in the case was whether the first computer program that allowed access to an “interactive web” was created by the little-known Chicago biologist Doyle, who runs Eolas out of Chicago. Or was it one of the web pioneers put on the stand by the defendant companies — such as Pei-Yuan Wei and his Viola browser, or Dave Raggett and his embed tag?

Jan 26, 2012 How does Google's new privacy policy compare?

QUOTE: Much ado has been made about Google's new overarching privacy policy, but the company's not doing anything much different than Facebook, Microsoft, Apple, or Yahoo

Dec 08, 2011 Breaking News: Feds Falsely Censor Popular Blog For Over A Year, Deny All Due Process, Hide All Details...

QUOTE: The US government has effectively admitted that it totally screwed up and falsely seized & censored a non-infringing domain of a popular blog, having falsely claimed that it was taking part in criminal copyright infringement. Then, after trying to hide behind a totally secretive court process with absolutely no due process whatsoever...

Sep 02, 2011 Group Says It Has New Evidence of Cisco’s Misdeeds in China

QUOTE: An advocacy group that accuses Cisco Systems of aiding the Chinese government in monitoring and apprehending members of the banned Falun Gong organization said Friday that it had new evidence to suggest that Cisco specifically tailored its technology for that purpose.

New York Times
Aug 31, 2011 Hackers may have stolen more than 200 SSL certificates: Source say DigiNotar breach generated fraudulent certs for Mozilla, Yahoo and Tor, not just Google

QUOTE: Hackers may have obtained more than 200 digital certificates from a Dutch company after breaking into its network, including ones for Mozilla, Yahoo and the Tor project....Security researchers now wonder what else DigiNotar hasn't told users.

Aug 22, 2011 Browsing and Privacy: How to Not Get Tracked: All modern browsers have built-in tools and add-ons to protect users from having their Web behavior tracked. But regardless, some sites still find ways to

QUOTE: Every time browser developers and others come up with a defense against tracking — the use of tiny bits of computer code that tells Web sites where you've been on the Internet — the other side ups the ante with a new trick. And it's happening again.

CIO Magazine
Jul 11, 2011 Google+: Too many eggs in the Google basket

QUOTE: this isn’t necessarily wrong of Google — it’s just following the law, after all — but it perfectly illustrates a far larger and more pressing issue: Alex lost his Gmail account, his contacts list, and every email he’s ever sent or received, because he updated his Google Profile. These are two services that are only tenuously linked by the Google Taskbar, yet inexorably linked by the Google umbrella.

Jul 07, 2011 To Slow Piracy, Internet Providers Ready Penalties

QUOTE: After years of negotiations with Hollywood and the music industry, the nation’s top Internet providers have agreed to a systematic approach to identifying customers suspected of digital copyright infringement and then alerting them via e-mail or other means....concerns that consumers might be punished “based on allegations that have not been tested in court.”

New York Times
Jun 22, 2011 Nazi hunting: How France first "civilized" the Internet

QUOTE: France has long attempted to "civilize" the Internet out of things like racism and Nazi ideology by curbing their dissemination. In fact, the first battle in this war concluded a decade ago. The winner was France; the loser was the then-reigning giant of the Web—Yahoo—along with the notion that the Internet is a "global" place that inherently transcends national boundaries.

Ars Technica
Jun 10, 2011 U.S. Senators Want to Shut Down Bitcoins, Currency of Internet Drug Trade

QUOTE: The tone of the senators' letter comes off as though they themselves don't know what entity they want to destroy or how to go about it. Bitcoins, by nature and general practice, are harmless; they're merely an Internet-based alternative to traditional federal banks. Silk Road is what the U.S. government is really after.

PC World
Apr 19, 2011 Freedom on the Net 2011

QUOTE: A large number of governments are also engaging in deliberate efforts to block access to information related to politics, social issues, and human rights.

CNN (Cable News Network)
Feb 17, 2011 Feds wrongly links 84,000 seized sites to child porn: Homeland Security overshoots as it takes down popular domain alongside child porn sites

QUOTE: As part of the successful seizure of 10 Web domains suspected of storing, displaying, or peddling child pornography, the Department of Justice and Homeland Security's ICE (Immigration and Customs Enforcement) office also seized a domain called's home to some 84,000 websites primarily belonging to individuals and small businesses.

Jan 09, 2011 Twitter Shines a Spotlight on Secret F.B.I. Subpoenas

QUOTE: THE news that federal prosecutors have demanded that the microblogging site Twitter provide the account details of people connected to the WikiLeaks case, including its founder, Julian Assange, isn’t noteworthy because the government’s request was unusual or intrusive. It is noteworthy because it became public.... the government — in the course of conducting inquiries — has been able to look through much of the information without the knowledge of the people being investigated.

New York Times
Dec 21, 2010 F.C.C. Approves Net Rules and Braces for Fight (Media Decoder)

QUOTE: The new rules [approved by the FCC-- Ed.] are, at best, net semi-neutrality. They ban any outright blocking and any “unreasonable discrimination” of Web sites or applications by fixed-line broadband providers, but they afford more wiggle room to wireless providers like AT&T and Verizon.

New York Times
Dec 08, 2010 ‘Operation Payback’ Attacks Fell (The Lede)

QUOTE: A group of Internet activists took credit for crashing the Web site on Wednesday afternoon, hours after they launched a similar attack on MasterCard. The cyber attacks, by activists who call themselves Anonymous, are aimed at punishing companies that have acted to stop the flow of donations to WikiLeaks in recent days. The group explained that its distributed denial of service attacks — in which they essentially flood Web sites site with traffic to slow them down or knock them offline — were part of a broader effort called Operation Payback, which began as a way of punishing companies that attempted to stop Internet file-sharing and movie downloads.

New York Times
Dec 01, 2010 F.T.C. Backs Plan to Honor Privacy of Online Users

QUOTE: Saying that online companies have failed to protect the privacy of Internet users, the Federal Trade Commission recommended a broad framework for commercial use of Web consumer data, including a simple and universal “do not track” mechanism that would essentially give consumers the type of control they gained over marketers with the national “do not call” registry.

New York Times
Dec 01, 2010 How Lieberman Got Amazon To Drop Wikileaks

QUOTE: [Amazon's] terms of acceptable use include a ban on illegal activities (it's not yet clear whether Wikileaks has broken any laws) and content "that may be harmful to our users, operations, or reputation." It also prohibits using Amazon's servers "to violate the security or integrity of any network, computer or communications system," although Wikileaks obviously obtained the cables long before hopping on Amazon's servers.

Talking Points Memo (TPM)
Nov 05, 2010 What happens when Internet Explorer breaks big-time: Much like a bad antivirus signature file, Microsoft's browser is flagging harmless sites and blocking access to them

QUOTE: Much like a bad antivirus signature file, Microsoft's browser is flagging harmless sites and blocking access to them

Oct 28, 2010 Will the lawyers shut down the Web over privacy?

QUOTE: A class-action lawsuit accuses Google of leaking personal data to advertisers -- but would the Web survive if search engines and social networks really had to preserve your privacy?

Jun 02, 2010 Heaviest Users of Phone Data Will Pay More

QUOTE: The trouble for AT&T was that a fraction of users — fewer than 2 percent — made such heavy use of the network that they slowed it down for everyone else. Starting on Monday, AT&T will offer tiered pricing. People will pay based on what they use, which the company says is fairer to everyone.

New York Times
May 18, 2010 EFF: Forget cookies, your browser has fingerprints

QUOTE: Even without cookies, popular browsers such as Internet Explorer and Firefox give Web sites enough information to get a unique picture of their visitors about 94 percent of the time, according to research compiled over the past few months by the Electronic Frontier Foundation.

May 18, 2010 The cloud's conflict of interest over interoperability: It's time for cloud customers to vote with their dollars to get the openness and portability they've been promised

QUOTE: The core motivation behind the lack of cloud interoperability is based on a simpler rationale: greed. Cloud providers have a clear conflict of interesting in support interoperability, as it deprives them of the ability to lock in customers.

Apr 22, 2010 Is Google the new Rome? Cloud computing may be leading to a federation-like worldview on data management, but national laws will be a major obstacle

QUOTE: Google's Rome-like worldview extends to how it will treat the location of customer data. Google is not offering U.S. businesses any specific assurance that their data will be stored in a U.S.-based data center.

Apr 08, 2010 Complicating Relationships in Media: Apple, NY Times Dealings Raise Questions

QUOTE: By appearing on stage at the Apple event and by launching an iPad app that the Times wants to monetize in every possible way — an app from which Apple will likely make money as well — the Times is becoming more of a business partner with a company it covers incessantly.

Feb 24, 2010 Microsoft Takes Down Whistleblower Site, Read the Secret Doc Here

QUOTE: Microsoft has managed to do what a roomful of secretive, three-letter government agencies have wanted to do for years: get the whistleblowing, government-document sharing site Cryptome shut down. Microsoft dropped a DMCA notice alleging copyright infringement on Cryptome’s proprietor John Young on Tuesday after he posted a Microsoft surveillance compliance document that the company gives to law enforcement agents seeking information on Microsoft users.

Jul 14, 2009 Brokering Peace Between Brand Owners and Domainers (Bits)

QUOTE: the proposal [in the Icann meeting] by a group of intellectual property lawyers about how to handle domains with trademarks — there was at least one agreement from nearly all sides: The current approach, which is based on an arbitration proceeding, is broken.

New York Times
Jul 07, 2009 Is Cybersquatting Against the Law? When is it OK to buy up an expired domain name? (Explainer)

QUOTE: Cybersquatting, the practice of buying up a domain in order to profit from a trademarked name, is prohibited under the 1999 Anticybersquatting Consumer Protection Act... The First Amendment makes it legal to grab even a famous person's domain name in some situations:...

Jun 25, 2009 Registrars under fire in domain disputes: Are domain registrars making money from cybersquatters at the expense of legitimate brands? If so, why isn't ICANN stopping it?

QUOTE: [Sarah] Deutsche says that all of the companies Verizon has sued for cybersquatting are domain-name registrars that have been accredited by the Internet Corporation for Assigned Names and Numbers...

Jun 18, 2009 The future of broadband And access for all: Fast internet for everyone, and a new tax to help pay for it

QUOTE: Spending public money on whizzy new networks appeals to technophiles, but the benefits are not clear for others.

Jun 18, 2009 Internet Marketing: Is Regulation Coming?

QUOTE: Up to now the government has had a hands-off policy toward online marketing, giving companies relatively free rein in how they use tools that track what people do online and then use that data to deliver tailored marketing messages....Advocates of regulation say Internet companies need to be more up-front about their use of so-called behavioral targeting.

Jun 17, 2009 Keeping a True Identity Becomes a Battle Online

QUOTE: Staking out and protecting their names and trademarks on the Internet has become a seemingly never-ending battle.

New York Times
Jun 08, 2009 Paying too much for .com domains? One group blames VeriSign

QUOTE: A group of DNS registrars claims that VeriSign's exclusive contract to manage the .com registry is a product of lobbying, astroturfing, meeting stacking, and legal threats—and it has meant that .com domains cost twice what they otherwise would.

Ars Technica
Jun 05, 2009 US shuts 'criminal' internet service provider

QUOTE: The US Federal Trade Commission for the first time has sued and immediately shut down an internet service provider it accused of being a haven for a wide range of criminal activity, including child pornography and the electronic theft of personal banking data.

Financial Times (FT)
Nov 22, 2008 New Paid Links Service Sparks More Debate: And the Gloves Come Off...

QUOTE: Quite a storm of debate has erupted over a new service called InLinks - essentially a paid text link service that allegedly makes it hard for Google (and other search engines) to detect them.

Nov 17, 2008 How to Reclaim Your Online Privacy

QUOTE: Have we as a culture abandoned our right to privacy? Absolutely not. While it's easy to give up, it's also easier than ever to take back your privacy. The new generation of Web browsers takes the possibility of your being snooped on seriously—and that's just the beginning. We'll show you how to go online and remain as stealthy as can be, so the chances of you being ID'd without your consent, or having your ID stolen, are slim to none.

PC Magazine
Nov 08, 2008 China Hijacks Popular BitTorrent Sites

QUOTE: China is not new to censoring the Internet, but up until now, BitTorrent sites have never been blocked. Recently however, several reports came in from China, indicating that popular BitTorrent sites such as Mininova, isoHunt and The Pirate Bay had been hijacked.

Nov 05, 2008 Google Wins the Presidential Election (So Does Obama)

QUOTE: if Lessig has Obama's ear, you might see more policies leaning towards "fair use" of other people's copyrighted works. That also dovetails with Google's agenda, which needs net neutrality and could use less content protection so it can take over the world by providing other people's content and its own advertising over other people's pipes.

PC Magazine
Oct 31, 2008 The Midnight Regulation Rush is On!

QUOTE: While most of us are distracted watching the presidential election, the U.S. Treasury Department is quietly pushing through new rules that potentially will have devastating consequences for privacy and e-commerce.

Oct 16, 2008 ISPs are pressed to become child porn cops: New law, new monitoring technology raise concerns about privacy

QUOTE: New technologies and changes in U.S. law are adding to pressures to turn Internet service providers into cops examining all Internet traffic for child pornography....Privacy advocates are raising objections to such tools, saying that monitoring all traffic would be an unconstitutional invasion....But such monitoring just became easier with a law approved unanimously by the Congress and signed on Monday by President Bush.

Oct 06, 2008 China's Eye on Web Chatter

ABSTRACT: In China, you can't search for anything you want on popular search engines like Yahoo! or Google. The government has set filters on words that it's leaders think may jeopardize the political state of China. In addition to this search limitation movement, there has been a surveillance scheme employed. In fact, the United States has assisted in the scheme.

Technology Review
Oct 01, 2008 Surveillance of Skype Messages Found in China

QUOTE: A group of Canadian human-rights activists and computer security researchers has discovered a huge surveillance system in China that monitors and archives certain Internet text conversations that include politically charged words.

New York Times
Sep 03, 2008 Microsoft proposes age-limited digital playgrounds

QUOTE: Microsoft proposes using existing identity verification systems such as school rosters, Department of Motor Vehicle registrations and/or Post Office passport documentation to create identity digital credentials that people would use online to access certain web sites.

Aug 19, 2008 Why You Should Enable Gmail's SSL Feature Right Now

QUOTE: SSL requires a key generated on your end and on the Gmail server’s end. There’s no way for the local guy at Starbucks to get those keys and unencrypt the data by packet sniffing...Did Google know about this? It turns out they were well aware of it. The reason Google didn’t grant users the SSL feature before, according to Perry, was because SSL is expensive.

Aug 15, 2008 Google Privacy Practices Worse Than ISP Snooping, AT&T Charges

QUOTE: Online advertising networks -- particularly Google's -- are more dangerous than the fledgling plans and dreams of ISPs to install eavesdropping equipment inside their internet pipes to serve tailored ads to their customers, AT&T says...AT&T denies that it currently digs deep into the net habits of its users "for the purpose [of] developing a profile of a particular consumer's online behavior."

Aug 08, 2008 Internet Security Hole Revealed: A researcher discloses the details of the major flaw he discovered earlier this year.

QUOTE: "We haven't had a bug like this in a decade," Kaminsky says. Because the attack takes advantage of an extremely common Internet transaction, the flaw is difficult to repair. "If you destroy this behavior, you destroy [the domain name system], and therefore you destroy the way the Internet works," Kaminsky says.

Technology Review

154 Articles and Resources. Go to:  [Next 50]   [End]