Quantcast
Channel: Tech matters Archives | APNIC Blog
Browsing all 240 articles
Browse latest View live

Three of the best: George Michaelson

In 2024, George Michaelson touched on topics ranging from news to explainers. Here are three of George’s best.

View Article


Three of the best: RPKI

Securing routing by adopting RPKI is now an essential practice in the modern Internet — here are three of 2024’s top posts.

View Article


Three of the best: Podcasts

APNIC’s Podcast PING continued to attract experts to discuss varied Internet operation topics — here are three of the best.

View Article

Three of the best: ‘How to…’

‘How to’ posts are a great way to learn how to use a new tool, troubleshoot problems, or perform advanced tasks. Here are three of 2024’s best.

View Article

Three of the best: Security

Here are APNIC Blog’s top three posts related to security for 2024.

View Article


BGP in 2024

Geoff Huston’s analysis of BGP routing table growth for 2024 and some projections.

View Article

BGP updates in 2024

Did the stability of the routing system change in 2024?

View Article

Observing the DDoS landscape requires collaboration

Guest Post: An industry-academic analysis on trends in direct-path and reflection-amplification attacks to encourage greater common understanding of the DDoS landscape.

View Article


First penguin advantage in cryptography?

Deprecating SHA-256, RSA, ECDSA, and ECDH key usage ahead of quantum computing?

View Article


IP addresses through 2024

What IPv4 and IPv6 addressing in 2024 tells us about the changing nature of the network.

View Article

How networking technology enables cheating in online exams

Guest Post: How might a student cheat during a supervised in-person online exam in a BYOD environment?

View Article

Reliable IoT network traffic inference

Understanding and managing changes in IoT device behaviour to make network traffic predictions more reliable.

View Article

IXP from scratch: Part 3 — The peering LAN

Guest Post: How we connected our two PoPs and which security and safety mechanisms (L2 and L3) we configured to ensure reliable operation.

View Article


How to convince your boss to deploy DNSSEC and RPKI

An improved strategy to advocate for DNSSEC and RPKI deployment.

View Article

[Podcast] RISKY BIZ-ness

Gautam Akiwate discusses his prize-winning paper on risks in the DNS supply chain.

View Article


Impact of scanning on authoritative nameservers

Guest Post: Investigating the risks of DNS scanning for the DNS infrastructure.

View Article

RPKI’s 2024 year in review

Guest Post: RPKI has become the number one tool in the toolbox to prevent routing incidents.

View Article


IXP steps into the terabit era

Guest Post: Tracing the growth of an IXP from a local hub to exceeding one terabit of Internet traffic.

View Article

Network traffic modelling approaches

Guest Post: Exploring the characteristics of various traffic models using synthetic data to gain insight into traffic patterns.

View Article

Recent cases of watering hole attacks: Part 1

Guest Post: Dissecting a recent watering hole and how to defend against them.

View Article
Browsing all 240 articles
Browse latest View live