Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
The Internet

Submission + - ICANN Wants To Change Rules For gTLDs (thedomains.com)

An anonymous reader writes: The May 10th deadline for comments on the .net registry agreement renewal has arrived with new domain name dispute changes that aid corporations. Instead of UDRP, the new agreement proposes adding the Uniform Rapid Suspension (URS) process to the .net TLD. The URS is a quick $200 process for a trademark holder to disable and take ownership of a domain. URS also reduces the panel size from 1-3 people to a single person. You can still comment on the proposal by sending an email to ICANN (net-agreement-renewal@).
Government

Submission + - FTC Introduces New Orders for Intel; No bundling (bloomberg.com)

eldavojohn writes: Today a decision was handed down (PDF) from the FTC that underlined new guidelines for Intel in the highly anticipated investigation. Biggest result: the practices Intel employed like bundling prices to get manufacturers like Dell to block sales of competitors' chips like AMD must stop. No word yet on whether or not Intel will face monetary fines from the FTC like they did in Europe over the same monopolistic practices.

Submission + - Entire .SE TLD Drops off the Internet (pingdom.com)

Icemaann writes: Pingdom and Network World are reporting that the .SE tld dropped off the internet yesterday due to a bug in the script that generates the .SE zone file. The .SE tld has close to one million domains that all went down due to missing the trailing dot in the SE zone file. Some caching nameservers may still be returning invalid DNS responses for 24 hours.
Security

Submission + - New DoS Vulnerability in All Versions of BIND 9 (isc.org)

Icemaann writes: ISC is reporting that a new, remotely exploitable, vulnerability has been found in all version of BIND 9. A specially crafted dynamic update packet will make BIND die with an assertion error. There is an exploit in the wild and there are no access control workarounds. RedHat claims that the exploit does not affect BIND servers that do not allow dynamic updates. This is a high priority vulnerability and DNS operators will want to upgrade BIND to the latest patch level.

Slashdot Top Deals

Did you know that if you took all the economists in the world and lined them up end to end, they'd still point in the wrong direction?

Working...