CINXE.COM
Bruce Van Nice on CircleID
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <head> <title>Bruce Van Nice on CircleID</title> <meta name="description" content="Profile page of Bruce Van Nice on CircleID" /> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <link rel="alternate" type="application/rss+xml" title="Feed for Bruce Van Nice" href="https://circleid.com/rss/members/3782" /> <link rel="shortcut icon" type="image/ico" href="/favicon.ico" /> <link rel="stylesheet" type="text/css" media="all" href="/css/base.css" /> <link rel="stylesheet" type="text/css" media="all" href="/css/posts.css" /> <link rel="stylesheet" type="text/css" media="all" href="/css/members.css" /> <script src="https://ajax.googleapis.com/ajax/libs/jquery/3.2.1/jquery.min.js"></script> <link href="https://fonts.googleapis.com/css2?family=PT+Serif:ital,wght@0,400;0,700;1,400;1,700&family=Roboto+Condensed:wght@400;700&family=Roboto+Mono:wght@300;400;700&family=Roboto:ital,wght@0,400;0,500;0,700;0,900;1,400;1,700&display=swap" rel="stylesheet"> <script type="text/javascript" src="/js/jq.clickmenu/jq.clickmenu.min.js"></script> <script type="text/javascript" src="/js/jq.scrollable/scrollable.min.js"></script> <script async src="https://cse.google.com/cse.js?cx=003374819184044847448:yb5rk7pq36s"></script> <!-- font awesome --> <script defer src="/fontawesome-free-6.6.0-web/js/brands.js"></script> <script defer src="/fontawesome-free-6.6.0-web/js/solid.js"></script> <script defer src="/fontawesome-free-6.6.0-web/js/fontawesome.js"></script> <div id="fb-root"></div> <script>(function (d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.5"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk'));</script> <script type="text/javascript"> $(document).ready(function() { $('.showHideBox').hide(); $('a#clickToggle').click(function() { $('.showHideBox').toggle(); $(this).toggleClass("toggle-show"); $(this).toggleClass("toggle-hide"); return false; }); }); </script> <!-- GA code --> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-85374710-1', 'auto'); ga('send', 'pageview'); </script> </head> <body> <div id="header"> <a href="/"><img class="headerLogo" src="/images/circleid.svg" border="0"/></a> <div class="headerLinks"> <span> Welcome: <a href="https://circleid.com/account/login">Login</a> | <a href="https://circleid.com/account/signup">Sign Up</a> | <a href="https://circleid.com/about">About CircleID</a> </span> <span> Follow: <a href="https://x.com/circleid" class="socialIcon"><i class="fa-brands fa-square-x-twitter"></i></a> | <a href="https://www.facebook.com/circleid/" class="socialIcon"><i class="fa-brands fa-square-facebook"></i></a> | <a href="https://www.linkedin.com/company/circleid" class="socialIcon"><i class="fa-brands fa-linkedin"></i></a> | <a href="http://feeds.circleid.com/cid_master/" class="socialIcon"><i class="fas fa-rss-square"></i></a> </span> </div> <div class="clear"></div> </div> <noscript> <div id="headerAlert"> WARNING: JavaScript is either disabled or not supported by your browser. You may encounter problems using various features on CircleID. </div> </noscript> <div id="headerNav"> <div id="headerNavContent"> <div id="headerNavMenu"> <ul> <li ><span class="head_menu"><a href="/">Home</a></span></li> <li> <span class="head_menu"><a href="https://circleid.com/topics">Topics</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu" style="width:480px;"> <table border="0" cellpadding="0" cellspacing="0"> <tr> <td> <a href="https://circleid.com/topics/access_providers">Access Providers</a> <a href="https://circleid.com/topics/artificial-intelligence">Artificial Intelligence</a> <a href="https://circleid.com/topics/blockchain">Blockchain</a> <a href="https://circleid.com/topics/brand_protection">Brand Protection</a> <a href="https://circleid.com/topics/broadband">Broadband</a> <a href="https://circleid.com/topics/censorship">Censorship</a> <a href="https://circleid.com/topics/cloud_computing">Cloud Computing</a> <a href="https://circleid.com/topics/cyberattack">Cyberattack</a> <a href="https://circleid.com/topics/cybercrime">Cybercrime</a> <a href="https://circleid.com/topics/cybersecurity">Cybersecurity</a> <a href="https://circleid.com/topics/data_center">Data Center</a> <a href="https://circleid.com/topics/ddos_attack">DDoS Attack</a> <a href="https://circleid.com/topics/dns">DNS</a> <a href="https://circleid.com/topics/dns-security">DNS Security</a> <a href="https://circleid.com/topics/domain-management">Domain Management</a> <a href="https://circleid.com/topics/domain_names">Domain Names</a> <a href="https://circleid.com/topics/email">Email</a> <a href="https://circleid.com/topics/enum">Enum</a> <a href="https://circleid.com/topics/gaming">Gaming</a> <a href="https://circleid.com/topics/icann">ICANN</a> <a href="https://circleid.com/topics/internet_governance">Internet Governance</a> <a href="https://circleid.com/topics/internet_of_things">Internet of Things</a> <a href="https://circleid.com/topics/internet_protocol">Internet Protocol</a> <a href="https://circleid.com/topics/ipv4-markets">IPv4 Markets</a> </td> <td style="border-left:1px solid #d5d5d5;border-right:1px solid #d5d5d5;padding:0 4px;"> <a href="https://circleid.com/topics/iptv">IPTV</a> <a href="https://circleid.com/topics/ipv6-transition">IPv6 Transition</a> <a href="https://circleid.com/topics/law">Law</a> <a href="https://circleid.com/topics/malware">Malware</a> <a href="https://circleid.com/topics/mobile_internet">Mobile Internet</a> <a href="https://circleid.com/topics/multilinguism">Multilinguism</a> <a href="https://circleid.com/topics/net_neutrality">Net Neutrality</a> <a href="https://circleid.com/topics/networks">Networks</a> <a href="https://circleid.com/topics/new_tlds">New TLDs</a> <a href="https://circleid.com/topics/p2p">P2P</a> <a href="https://circleid.com/topics/policy_regulation">Policy & Regulation</a> <a href="https://circleid.com/topics/privacy">Privacy</a> <a href="https://circleid.com/topics/regional_registries">Regional Registries</a> <a href="https://circleid.com/topics/registry_services">Registry Services</a> <a href="https://circleid.com/topics/satellite-internet">Satellite Internet</a> <a href="https://circleid.com/topics/spam">Spam</a> <a href="https://circleid.com/topics/telecom">Telecom</a> <a href="https://circleid.com/topics/udrp">UDRP</a> <a href="https://circleid.com/topics/voip">VoIP</a> <a href="https://circleid.com/topics/vpn">VPN</a> <a href="https://circleid.com/topics/web">Web</a> <a href="https://circleid.com/topics/white_space">White Space</a> <a href="https://circleid.com/topics/whois">Whois</a> <a href="https://circleid.com/topics/wireless">Wireless</a> </td> <td style="padding:0 0 0 4px;"> <div class="itemTitle">Display Options:</div> <a href="https://circleid.com/topics">List by Popularity</a> <a href="https://circleid.com/topics/chart">Chart by Popularity</a> </td> </tr> </table> </div> </li> <li> <span class="head_menu"><a href="https://circleid.com/blogs">Blogs</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu"> <a href="https://circleid.com/blogs">Latest</a> <a href="https://circleid.com/blogs/recently_discussed">Recently Discussed</a> <a href="https://circleid.com/blogs/most_discussed">Most Discussed</a> <a href="https://circleid.com/blogs/most_viewed">Most Viewed</a> </div> </li> <li> <span class="head_menu"><a href="https://circleid.com/news">News</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu"> <a href="https://circleid.com/news">Latest</a> <a href="https://circleid.com/news/recently_discussed">Recently Discussed</a> <a href="https://circleid.com/news/most_discussed">Most Discussed</a> <a href="https://circleid.com/news/most_viewed">Most Viewed</a> </div> </li> <li> <span class="head_menu"><a href="https://circleid.com/community">Community</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu"> <a href="https://circleid.com/community">Recently Featured</a> <a href="https://circleid.com/community/most_featured">Most Featured</a> <a href="https://circleid.com/community/most_active">Most Active</a> <a href="https://circleid.com/community/most_read">Most Read</a> <a href="https://circleid.com/community/recent_members">Recent Members</a> <a href="https://circleid.com/community/top_100" class="itemLine">Top 100 Leaderboard</a> <a href="https://circleid.com/community/alphabetical" class="itemLine">Alphabetical View</a> <a href="https://circleid.com/community/random">Random View</a> <a href="https://circleid.com/comments" class="itemLine">Recent Comments</a> </div> </li> <li> <span class="head_menu"><a href="https://circleid.com/industry">Industry</a><img src="/js/jq.clickmenu/arrow.gif" class="arrow" /></span> <div class="subMenu"> <a href="https://circleid.com/industry">Latest Posts</a> <a href="https://circleid.com/industry/most_viewed">Most Viewed</a> <a href="https://circleid.com/industry/leaderboard">Leaderboard</a> <a href="https://circleid.com/industry/members" class="itemLine"><strong>CircleID Members:</strong></a> <a href="/members/8495">CSC</a> <a href="/members/9196">Brand Registry Group</a> <a href="/members/7855">i2Coalition</a> <a href="/members/1582">Godaddy Registry</a> <a href="/members/8076">Internet Commerce Association</a> <a href="/members/8622">IPv4.Global</a> <a href="/members/6851">Radix Registry</a> <a href="/members/8414">Threat Intelligence Platform (TIP)</a> <a href="/members/5593">Verisign</a> <a href="/members/8352">WhoisXML API</a> </div> </li> </ul> </div> <style> /* Search Box */ form.gsc-search-box { font-size: 14px; margin: 0 0 0 0; width: 100%; padding:0; } table.gsc-search-box td.gsc-input { padding:0 3px 5px 0; } /* Search input */ .gsc-input { font-size: 15px; } /* Search Button */ .gsc-search-button-v2 { font-size: 0; padding: 7px 12px; width: auto; vertical-align: middle; margin: -5px 0 0 0; } </style> <!-- search --> <div style="width:300px;float:right;margin: 0;padding: 0;"> <div class="gcse-searchbox-only"></div> </div> <!-- search --> <div class="clear"></div> </div> </div> <div id="headerSub"> <!-- MEMBER HEADER ///////////////////////////////////////////////////// --> <div id="headerProfile"> <!-- Photo or Logo --> <div class='memPhoto'> <a href="https://circleid.com/members/3782"><img src="/images/member_photos/photo_3782.jpg" width="80" border="0" alt="Bruce Van Nice" /></a> </div> <!-- Info --> <div class="memInfo"> <h3>Bruce Van Nice</h3> <p> <strong></strong><br /> Joined on February 12, 2009<br/> Total Post Views: 118,342 </p> <table class="btn-container"><tr><td class="btl"></td><td class="btr"></td></tr><tr><td class="bbl"></td><td class="bbr"><a href="#" class="toggle-show" id="clickToggle">About</a></td></tr></table> </div> <!-- Buttons --> <div class="buttons"> <!-- Message --> <table class="btn-container"> <tr><td class="btl"></td><td class="btr"></td></tr> <tr><td class="bbl"></td><td class="bbr"><a href="https://circleid.com/account/email_console/3782/" class="email">Send Message</a></td></tr> </table> <!-- RSS --> <table class="btn-container"> <tr><td class="btl"></td><td class="btr"></td></tr> <tr><td class="bbl"></td><td class="bbr"><a href="https://circleid.com/rss/members/3782" class="rss">RSS</a></td></tr> </table> </div> <div class="clear"></div> </div> <!-- MEMBER SUB HEADER ///////////////////////////////////////////////////// --> <div id="headerSubProfile" class="showHideBox"> <div id="bio"> <p><em>Information about this member is not available yet.</em></p> </div> <div id="links" class="pipedLinks"> <ul> </ul> </div> <p id="cc"> Except where otherwise noted, all postings by Bruce Van Nice on CircleID are licensed under a <a rel="license" href="http://creativecommons.org/licenses/ /2.5/" class="blue">Creative Commons License</a>. </p> </div> <!-- MEMBER SUB NAV ///////////////////////////////////////////////////// --> <div id="headerSubNav"> <ul> <li id="current"><a href="https://circleid.com/members/3782">Featured Blogs (11)</a></li> <li ><a href="https://circleid.com/members/3782/comments/">Comments (5)</a></li> </ul> <div class="clear"></div> </div> </div> <!-- MEMBER POSTS ///////////////////////////////////////////////////// --> <div class="container2c"> <div class="colWrapper"> <div class="colA"> <div class="colPad"> <h2>Featured Blogs</h2> <div class="postList" style="padding-bottom:30px;"> <h3 style="padding-top:0;margin-top:0;border:none;"><a href="https://circleid.com/posts/20190826_dot_and_doh_guidelines_provisioning_resolvers">DoT and DoH Guidance: Provisioning Resolvers</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>, <a href="/topics/dns" class="red">DNS</a>, <a href="/topics/dns-security" class="red">DNS Security</a>, <a href="/topics/internet_protocol" class="red">Internet Protocol</a>, <a href="/topics/policy_regulation" class="red">Policy & Regulation</a>, <a href="/topics/privacy" class="red">Privacy</a>, <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> As part of a larger effort to make the internet more private, the IETF defined two protocols to encrypt DNS queries between clients (stub resolvers) and resolvers: DNS over TLS in RFC 7858 (DoT) and DNS over HTTPS in RFC 8484 (DoH). As with all new internet protocols, DoT and DoH will continue to evolve as deployment experience is gained, and they're applied to more use cases. <a href="https://circleid.com/posts/20190826_dot_and_doh_guidelines_provisioning_resolvers" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By <a href="https://circleid.com/members/3782" class="blue">Bruce Van Nice</a></li> <li>Aug 26, 2019</li> <li>Comments: 0</li> <li>Views: 9,151</li> </ul> </div> <h3><a href="https://circleid.com/posts/20150415_dns_based_ddos_diverse_options_for_attackers">DNS-Based DDoS: Diverse Options for Attackers</a></h3> <div class="byLine">Related Topics: <a href="/topics/cyberattack" class="red">Cyberattack</a>, <a href="/topics/cybersecurity" class="red">Cybersecurity</a>, <a href="/topics/ddos_attack" class="red">DDoS Attack</a>, <a href="/topics/dns" class="red">DNS</a>, <a href="/topics/malware" class="red">Malware</a>, <a href="/topics/networks" class="red">Networks</a>, <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> Denial of service attacks have been around since the Internet was commercialized and some of the largest attacks ever launched relied on DNS, making headlines. But every day a barrage of smaller DNS-based attacks take down targets and severely stress the DNS ecosystem. Although DNS servers are not usually the target of attacks they are often disrupted so attention from operation teams is required. There is no indication the problem is going away and attackers continue to innovate. <a href="https://circleid.com/posts/20150415_dns_based_ddos_diverse_options_for_attackers" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By <a href="https://circleid.com/members/3782" class="blue">Bruce Van Nice</a></li> <li>Apr 15, 2015</li> <li>Comments: 0</li> <li>Views: 13,004</li> </ul> </div> <h3><a href="https://circleid.com/posts/20130918_dns_amplification_attacks_out_of_sight_out_of_mind_part_3">DNS Amplification Attacks: Out of Sight, Out of Mind? (Part 3)</a></h3> <div class="byLine">Related Topics: <a href="/topics/cyberattack" class="red">Cyberattack</a>, <a href="/topics/cybersecurity" class="red">Cybersecurity</a>, <a href="/topics/dns" class="red">DNS</a>, <a href="/topics/dns-security" class="red">DNS Security</a>, <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> Previous posts (Part 1 and Part 2) offer background on DNS amplification attacks being observed around the world. These attacks continue to evolve. Early attacks focused on authoritative servers using "ANY" queries for domains that were well known to offer good amplification. Response Rate Limiting (RRL) was developed to respond to these early attacks. RRL, as the name suggests, is deployed on authoritative servers to rate limit responses to target names. <a href="https://circleid.com/posts/20130918_dns_amplification_attacks_out_of_sight_out_of_mind_part_3" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By <a href="https://circleid.com/members/3782" class="blue">Bruce Van Nice</a></li> <li>Sep 18, 2013</li> <li>Comments: 0</li> <li>Views: 9,466</li> </ul> </div> <h3><a href="https://circleid.com/posts/20130903_dns_amplification_attacks_out_of_sight_out_of_mind_part_2">DNS Amplification Attacks: Out of Sight, Out of Mind? (Part 2)</a></h3> <div class="byLine">Related Topics: <a href="/topics/cyberattack" class="red">Cyberattack</a>, <a href="/topics/cybersecurity" class="red">Cybersecurity</a>, <a href="/topics/dns" class="red">DNS</a>, <a href="/topics/dns-security" class="red">DNS Security</a>, <a href="/topics/networks" class="red">Networks</a>, <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> This post follows an earlier post about DNS amplification attacks being observed around the world. DNS Amplification Attacks are occurring regularly and even though they aren't generating headlines targets have to deal with floods of traffic and ISP infrastructure is needlessly stressed -- load balancers fail, network links get saturated, and servers get overloaded. And far more intense attacks can be launched at any time. <a href="https://circleid.com/posts/20130903_dns_amplification_attacks_out_of_sight_out_of_mind_part_2" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By <a href="https://circleid.com/members/3782" class="blue">Bruce Van Nice</a></li> <li>Sep 04, 2013</li> <li>Comments: 3</li> <li>Views: 11,653</li> </ul> </div> <h3><a href="https://circleid.com/posts/20130823_dns_amplification_attacks_out_of_sight_out_of_mind">DNS Amplification Attacks: Out of Sight, Out of Mind? (Part 1)</a></h3> <div class="byLine">Related Topics: <a href="/topics/cyberattack" class="red">Cyberattack</a>, <a href="/topics/cybersecurity" class="red">Cybersecurity</a>, <a href="/topics/dns" class="red">DNS</a>, <a href="/topics/dns-security" class="red">DNS Security</a>, <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> Geoff Huston's recent post about the rise of DNS amplification attacks offers excellent perspective on the issue. Major incidents like the Spamhaus attack Geoff mentions at the beginning of his post make headlines, but even small attacks create noticeable floods of traffic. These attacks are easy to launch and effective even with relatively modest resources and we see evidence they're occurring regularly. Although DNS servers are not usually the target of these attacks the increase in traffic and larger response sizes typically stress DNS infrastructure and require attention from operation teams. <a href="https://circleid.com/posts/20130823_dns_amplification_attacks_out_of_sight_out_of_mind" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By <a href="https://circleid.com/members/3782" class="blue">Bruce Van Nice</a></li> <li>Aug 23, 2013</li> <li>Comments: 0</li> <li>Views: 12,903</li> </ul> </div> <h3><a href="https://circleid.com/posts/20120628_high_performance_dns_needs_high_performance_security">High Performance DNS Needs High Performance Security</a></h3> <div class="byLine">Related Topics: <a href="/topics/cyberattack" class="red">Cyberattack</a>, <a href="/topics/cybercrime" class="red">Cybercrime</a>, <a href="/topics/cybersecurity" class="red">Cybersecurity</a>, <a href="/topics/dns" class="red">DNS</a>, <a href="/topics/networks" class="red">Networks</a>,</div> <p> There's been a lot of emphasis on DNS performance lately because faster DNS contributes directly to a better user experience. There's an interesting flipside to DNS performance though, higher performance DNS servers may be better targets for cache poisoning attacks. Faster servers give attackers more opportunities to insert fake entries into the DNS - speed can kill (or at least inflict a nasty wound!) so it's important to understand the security implications if you're looking to upgrade DNS performance. <a href="https://circleid.com/posts/20120628_high_performance_dns_needs_high_performance_security" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By <a href="https://circleid.com/members/3782" class="blue">Bruce Van Nice</a></li> <li>Jun 28, 2012</li> <li>Comments: 0</li> <li>Views: 10,210</li> </ul> </div> <h3><a href="https://circleid.com/posts/20120613_the_business_parallels_between_ipv6_and_dnssec">The Business Parallels Between IPv6 and DNSSEC</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>, <a href="/topics/dns" class="red">DNS</a>, <a href="/topics/dns-security" class="red">DNS Security</a>, <a href="/topics/internet_protocol" class="red">Internet Protocol</a>, <a href="/topics/ipv6-transition" class="red">IPv6 Transition</a>, <a href="/topics/ipv4-markets" class="red"> IPv4 Markets</a>,</div> <p> For two things that would seem to be completely unrelated there is an interesting parallel between IPv6 and DNSSEC. In both cases there is a misalignment of interests between content providers and service?providers. Content providers aren't highly motivated to deploy IPv6 because only a small proportion of users have v6 connectivity and even fewer only have v6. Service providers aren't anxious to deploy IPv6? because there isn't a lot of content on v6, and virtually none exclusively on v6 - so they don't expand the universe of interesting stuff on the web by deploying IPv6. Basically the same things could be said about DNSSEC. <a href="https://circleid.com/posts/20120613_the_business_parallels_between_ipv6_and_dnssec" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By <a href="https://circleid.com/members/3782" class="blue">Bruce Van Nice</a></li> <li>Jun 13, 2012</li> <li>Comments: 1</li> <li>Views: 10,215</li> </ul> </div> <h3><a href="https://circleid.com/posts/20120522_a_logical_place_to_start_the_ipv6_transition">A Logical Place to Start the IPv6 Transition</a></h3> <div class="byLine">Related Topics: <a href="/topics/ddos_attack" class="red">DDoS Attack</a>, <a href="/topics/dns" class="red">DNS</a>, <a href="/topics/ipv6-transition" class="red">IPv6 Transition</a>, <a href="/topics/ipv4-markets" class="red"> IPv4 Markets</a>,</div> <p> The transition to IPv6 is top of mind for most service providers. Even in places where there are still IPv4 addresses to be had surveys we've run suggest v6 is solidly on the priority list. That's not to say everyone has the same strategy. Depending where you are in the world transition options are different -- in places such as APAC where exhaustion is at hand one of the many NAT alternatives will likely be deployed since getting a significant allocation of addresses is not going to happen and other alternatives for obtaining addresses will prove expensive. <a href="https://circleid.com/posts/20120522_a_logical_place_to_start_the_ipv6_transition" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By <a href="https://circleid.com/members/3782" class="blue">Bruce Van Nice</a></li> <li>May 22, 2012</li> <li>Comments: 0</li> <li>Views: 10,583</li> </ul> </div> <h3><a href="https://circleid.com/posts/20120502_spam_from_mobile_networks_who_woulda_thought">Spam from Mobile Networks? Who Woulda Thought…</a></h3> <div class="byLine">Related Topics: <a href="/topics/access_providers" class="red">Access Providers</a>, <a href="/topics/cybersecurity" class="red">Cybersecurity</a>, <a href="/topics/dns" class="red">DNS</a>, <a href="/topics/malware" class="red">Malware</a>, <a href="/topics/mobile_internet" class="red">Mobile Internet</a>, <a href="/topics/networks" class="red">Networks</a>, <a href="/topics/spam" class="red">Spam</a>, <a href="/topics/threat-intelligence" class="red">Threat Intelligence</a>,</div> <p> Mobile networks aren't usually thought of as sources of spam, but a quick look at some of the resources that track spam reveals they actually are. This is counter intuitive at first glance because when most people think of mobile they think of smartphones, and those aren't known to be sources of spam (at least not yet). What's really going on is PCs connected to mobile networks with air cards, or tethered with a smartphone where it's permissible, are the culprits <a href="https://circleid.com/posts/20120502_spam_from_mobile_networks_who_woulda_thought" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By <a href="https://circleid.com/members/3782" class="blue">Bruce Van Nice</a></li> <li>May 02, 2012</li> <li>Comments: 2</li> <li>Views: 9,878</li> </ul> </div> <h3><a href="https://circleid.com/posts/20120418_driving_dnssec_need_for_integration_of_all_the_functions_needed">Driving DNSSEC: The Need for Integration of All the Functions Needed</a></h3> <div class="byLine">Related Topics: <a href="/topics/cybersecurity" class="red">Cybersecurity</a>, <a href="/topics/dns" class="red">DNS</a>, <a href="/topics/dns-security" class="red">DNS Security</a>,</div> <p> DNSSEC continues to gain momentum as network operators and domain owners watch and learn from early adopters. The learning process is made easier by efforts such as the ongoing work conducted by researchers at Sandia labs to methodically identify and categorize the kinds of problems that are occurring. <a href="https://circleid.com/posts/20120418_driving_dnssec_need_for_integration_of_all_the_functions_needed" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By <a href="https://circleid.com/members/3782" class="blue">Bruce Van Nice</a></li> <li>Apr 18, 2012</li> <li>Comments: 2</li> <li>Views: 10,922</li> </ul> </div> <h3><a href="https://circleid.com/posts/20090420_time_to_supplement_desktop_security_protections">Is It Time to Supplement Desktop Security Protections?</a></h3> <div class="byLine">Related Topics: <a href="/topics/cyberattack" class="red">Cyberattack</a>, <a href="/topics/cybercrime" class="red">Cybercrime</a>, <a href="/topics/cybersecurity" class="red">Cybersecurity</a>, <a href="/topics/dns" class="red">DNS</a>, <a href="/topics/malware" class="red">Malware</a>, <a href="/topics/telecom" class="red">Telecom</a>,</div> <p> Internet users are acutely aware of their exposure on the Internet and clearly concerned about their safety. Increased downloads of scareware as Conficker made headlines in the mainstream media are only the latest evidence. Desktop software is often viewed as a one-stop shop for fighting Internet threats such as viruses, worms and other forms of malware and phishing. These solutions have served us well but more protections are needed to address the dynamic and increasingly sophisticated web based exploits being launched... <a href="https://circleid.com/posts/20090420_time_to_supplement_desktop_security_protections" class="red"><span class="readmore">more</span></a> </p> <div class="postInfo pipedLinks"> <ul> <li>By <a href="https://circleid.com/members/3782" class="blue">Bruce Van Nice</a></li> <li>Apr 20, 2009</li> <li>Comments: 0</li> <li>Views: 10,357</li> </ul> </div> </div> </div> </div> </div> <div class="colB"> <div class="colPad"> <!-- TOPIC INTERESTS --> <h2 style="margin-bottom:10px;">Topic Interests</h2> <div style="padding:0 0 30px 0;line-height:20px;"> <a href="https://circleid.com/topicsdns"><strong>DNS</strong></a>, <a href="https://circleid.com/topicscybersecurity"><strong>Cybersecurity</strong></a>, <a href="https://circleid.com/topicscyberattack"><strong>Cyberattack</strong></a>, <a href="https://circleid.com/topicstelecom"><strong>Telecom</strong></a>, <a href="https://circleid.com/topicscybercrime"><strong>Cybercrime</strong></a>, <a href="https://circleid.com/topicsmalware"><strong>Malware</strong></a>, <a href="https://circleid.com/topicsdns-security"><strong>DNS Security</strong></a>, <a href="https://circleid.com/topicsaccess_providers"><strong>Access Providers</strong></a>, <a href="https://circleid.com/topicsspam"><strong>Spam</strong></a>, <a href="https://circleid.com/topicsmobile_internet"><strong>Mobile Internet</strong></a>, <a href="https://circleid.com/topicsnetworks"><strong>Networks</strong></a>, <a href="https://circleid.com/topicsthreat-intelligence"><strong>Threat Intelligence</strong></a>, <a href="https://circleid.com/topicsipv6-transition"><strong>IPv6 Transition</strong></a>, <a href="https://circleid.com/topicsipv4-markets"><strong> IPv4 Markets</strong></a>, <a href="https://circleid.com/topicsddos_attack"><strong>DDoS Attack</strong></a>, <a href="https://circleid.com/topicsinternet_protocol"><strong>Internet Protocol</strong></a>, <a href="https://circleid.com/topicsprivacy"><strong>Privacy</strong></a>, <a href="https://circleid.com/topicspolicy_regulation"><strong>Policy & Regulation</strong></a>, <a href="https://circleid.com/topicsvoip"><strong>VoIP</strong></a>, <a href="https://circleid.com/topicsbroadband"><strong>Broadband</strong></a>, <a href="https://circleid.com/topicswireless"><strong>Wireless</strong></a>, <a href="https://circleid.com/topicswhite_space"><strong>White Space</strong></a>, <a href="https://circleid.com/topicslaw"><strong>Law</strong></a>, <a href="https://circleid.com/topicsinternet_governance"><strong>Internet Governance</strong></a>, <a href="https://circleid.com/topicsnet_neutrality"><strong>Net Neutrality</strong></a> </div> <!-- RECENT COMMENTS --> <h2>Recent Comments</h2> <div class="postListMini" style="padding:0 0 15px 0;"> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20120418_driving_dnssec_need_for_integration_of_all_the_functions_needed/#8875">Driving DNSSEC: The Need for Integration of All the Functions Needed</a></strong> <div class="byLine">Apr 20, 2012 5:49 PM PDT</div> </div> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20090602_isp_regulation_ip_address_logging/#5422">A Clear Case for ISP Regulation: IP Address Logging</a></strong> <div class="byLine">Jun 04, 2009 4:40 PM PDT</div> </div> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20090602_isp_regulation_ip_address_logging/#5418">A Clear Case for ISP Regulation: IP Address Logging</a></strong> <div class="byLine">Jun 03, 2009 11:58 PM PDT</div> </div> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20090407_government_cybersecurity_partnership_or_power_grab/#5291">Government Regulation of Cybersecurity: Partnership (or Power Grab) in the Making?</a></strong> <div class="byLine">Apr 08, 2009 5:22 PM PDT</div> </div> <div class="cmntList"> <strong><a href="https://circleid.com/posts/20090211_ten_telecom_tsunamis/#5105">Ten Telecom Tsunamis</a></strong> <div class="byLine">Feb 12, 2009 7:51 PM PST</div> </div> </div> <!-- RECENT BLOGS --> <!-- MOST POPULAR --> <h2>Popular Posts</h2> <div class="postListMini" style="padding:0 0 30px 0;"> <h3 style="padding-top:0;margin-top:0;border:none;"><a href="https://circleid.com/posts/20150415_dns_based_ddos_diverse_options_for_attackers">DNS-Based DDoS: Diverse Options for Attackers</a></h3> <div class="byLine pipedLinks"> <ul> <li>Apr 15, 2015</li> <li>Comments: 0</li> <li>Views: 13,004</li> </ul> </div> <h3><a href="https://circleid.com/posts/20130823_dns_amplification_attacks_out_of_sight_out_of_mind">DNS Amplification Attacks: Out of Sight, Out of Mind? (Part 1)</a></h3> <div class="byLine pipedLinks"> <ul> <li>Aug 23, 2013</li> <li>Comments: 0</li> <li>Views: 12,903</li> </ul> </div> <h3><a href="https://circleid.com/posts/20130903_dns_amplification_attacks_out_of_sight_out_of_mind_part_2">DNS Amplification Attacks: Out of Sight, Out of Mind? (Part 2)</a></h3> <div class="byLine pipedLinks"> <ul> <li>Sep 04, 2013</li> <li>Comments: 3</li> <li>Views: 11,653</li> </ul> </div> <h3><a href="https://circleid.com/posts/20120418_driving_dnssec_need_for_integration_of_all_the_functions_needed">Driving DNSSEC: The Need for Integration of All the Functions Needed</a></h3> <div class="byLine pipedLinks"> <ul> <li>Apr 18, 2012</li> <li>Comments: 2</li> <li>Views: 10,922</li> </ul> </div> <h3><a href="https://circleid.com/posts/20120522_a_logical_place_to_start_the_ipv6_transition">A Logical Place to Start the IPv6 Transition</a></h3> <div class="byLine pipedLinks"> <ul> <li>May 22, 2012</li> <li>Comments: 0</li> <li>Views: 10,583</li> </ul> </div> </div> </div> </div> <div class="clear"></div> </div> <div id="footer"> <div id="footerContent"> <div style="float:left;"> <a href="/"><img src="/images/circleid.svg" border="0" style="width:140px;opacity: 0.9;" /></a><br /> <p style="font-size:14px;padding:11px 0 15px 0;margin:0;">A World-Renowned Source for Internet Developments. Serving Since 2002.</p> </div> <div style="float:right;"> <p style="font-size:12px;padding:0 0 10px 0;margin:0;line-height:1em;text-align:right;letter-spacing:0.05em;">FOLLOW</p> <a href="https://x.com/circleid" class="socialIcon"><i class="fa-brands fa-square-x-twitter"></i></a> <a href="https://www.facebook.com/circleid/" class="socialIcon"><i class="fa-brands fa-square-facebook"></i></a> <a href="https://www.linkedin.com/company/circleid" class="socialIcon"><i class="fa-brands fa-linkedin"></i></a> <a href="http://feeds.circleid.com/cid_master/" class="socialIcon"><i class="fas fa-rss-square"></i></a> </div> <div id="links" class="clear"> CIRCLEID: <a href="https://circleid.com/about">About</a> | <a href="https://circleid.com/about/contact">Contact Us</a> <br /> SECTIONS: <a href="/">Home</a> | <a href="https://circleid.com/topics">Topics</a> | <a href="https://circleid.com/blogs">Featured Blogs</a> | <a href="https://circleid.com/news">News Briefs</a> | <a href="https://circleid.com/industry">Industry Updates</a> | <a href="https://circleid.com/community">Community</a> <br /> TERMS OF USE: <a href="https://circleid.com/about/codes">Codes of Conduct</a> | <a href="https://circleid.com/about/privacy">Privacy Policy</a> | <a href="https://circleid.com/about/terms">Terms of Use</a> <br /><br /> Copyright © 2002-2025 CircleID. All rights reserved unless where otherwise noted. <br />Local Time: Monday, March 24, 2025 06:37 PM PDT – Page Load: 0.4502 Sec. </div> </div> </div> </body> </html>