Home » Archive by categoryInternet News

First experience : Using the Escrow.com Domain Concierge service for domain transactions

acro.net acro.net: As an Escrow.com customer for the past 15 years, I’ve been using its services exclusively for the acquisition and sale of domain names. Exactly a year ago, Escrow.com launched its Domain Concierge service, during NamesCon 2016. I’ve just completed my first transaction using the Escrow.com Domain Concierge, and this is a quick review of my […]

The post First experience : Using the Escrow.com Domain Concierge service for domain transactions appeared first on iGoldRush Domain News and Resources.

Continue reading

PIR slams brakes on “UDRP for copyright”

DomainIncite DomainIncite: Public Interest Registry has “paused” its plan to allow copyright owners to seize .org domains used for piracy. In a statement last night, PIR said the plans were being shelved in response to publicly expressed concerns. The Systemic Copyright Infringement Alternative Dispute Resolution Policy was an in-house development, but had made its way into the […]

Related posts:Angry reactions to “UDRP for copyright”
The Pirate Bay likely to be sunk as .org adopts “UDRP for copyright”
UDRP reform effort begins

The post PIR slams brakes on “UDRP for copyright” appeared first on iGoldRush Domain News and Resources.

Continue reading

Where do you see 3L.com prices going ?

TheDomains TheDomains: There has been discussion on Namepros and on social media about where the prices of 3L.com are going. One of the best performing and most liquid of all the domain name categories. So far in 2017, Namebio has recorded 34 three letter .com sales. 2 sales have eclipsed six figures, DiL.com sold by BQDN and […]
The post Where do you see 3L.com prices going ? appeared first on TheDomains.com.

The post Where do you see 3L.com prices going ? appeared first on iGoldRush Domain News and Resources.

Continue reading

FCC Gives Approval to LTE-U Devices

CircleID CircleID: Ericsson, Nokia get go-ahead for LTE-U base stations despite early fears they might interfere with Wi-Fi – Jon Gold reporting in Network World: "The Federal Communications Commission today approved two cellular base stations — one each from Ericsson and Nokia — to use LTE-U, marking the first official government thumbs-up for the controversial technology. ... T-Mobile has already announced that it will be deploying LTE-U technology… Other major tech sector players, including Google, Comcast, and Microsoft, have expressed serious concerns that LTE-U doesn't play as nicely with Wi-Fi as advertised."
Follow CircleID on TwitterMore under: Mobile, Policy & Regulation, Wireless

The post FCC Gives Approval to LTE-U Devices appeared first on iGoldRush Domain News and Resources.

Continue reading

Security Researchers Announce First SHA-1 Collision, Confirming Fears About Its Vulnerabilities

CircleID CircleID:

In a joint announcement today, Dutch research institute CWI and Google revealed that they have broken the SHA-1 internet security standard "in practice". Industry cryptographic hash functions such as SHA1 are used for digital signatures and file integrity verification, and protects a wide spectrum of digital assets, including credit card transactions, electronic documents, open-source software repositories and software updates.

— "Today, 10 years after of SHA-1 was first introduced, we are announcing the first practical technique for generating a collision," said the Google Team in a blog post today. "This represents the culmination of two years of research that sprung from a collaboration between the CWI Institute in Amsterdam and Google. ... For the tech community, our findings emphasize the necessity of sunsetting SHA-1 usage. Google has advocated the deprecation of SHA-1 for many years, particularly when it comes to signing TLS certificates. ... We hope our practical attack on SHA-1 will cement that the protocol should no longer be considered secure."

— What types of systems are affected? "Any application that relies on SHA-1 for digital signatures, file integrity, or file identification is potentially vulnerable. These include digital certificate signatures, email PGP/GPG signatures, software vendor signatures, software updates, ISO checksums, backup systems, deduplication systems, and GIT." https://shattered.io/

— "This is not a surprise. We've all expected this for over a decade, watching computing power increase. This is why NIST standardized SHA-3 in 2012." Bruce Schneier / Feb 23
Follow CircleID on TwitterMore under: Cyberattack, Security

The post Security Researchers Announce First SHA-1 Collision, Confirming Fears About Its Vulnerabilities appeared first on iGoldRush Domain News and Resources.

Continue reading