
Pi-hole Installation Guide
Johannes Weber
Based in Butzbach, Germany
• 9 min read
Ever wondered how to set up Pi-hole with your own recursive DNS server using DNSSEC? Here's how!

Based in Butzbach, Germany
• 9 min read
Ever wondered how to set up Pi-hole with your own recursive DNS server using DNSSEC? Here's how!

Kathleen Moriarty, founder of SecurityBiaS is technology strategist and board advisor, working with SaaS providers on security to Build-in at Scale benefiting both the provider and their customer base. Adjunct Professor at Georgetown SCS, teaching Security Architecture and Design and Cyber Threat Intelligence. Formerly as the Chief Technology Officer, Center … More
• 5 min read
To prevent attacks, there's a push for multi-factor authentication. This is a vital step and should be considered if your organisation hasn't yet made the transition. But while MFA adds protections, how you implement single sign-on, authorisation, and/or federation requires consideration.

Suzanne Taylor is a Public Policy & Internet Governance Consultant. In her work with the RIPE NCC, she engaged with a broad range of Internet stakeholders including the RIPE NCC membership, governments, law enforcement and intergovernmental organisations. From 2012 to 2016, she worked in communications at the RIPE NCC and … More
• 4 min read
We take a comprehensive look at three different countries in the Mediterranean region as the next in our series of RIPE NCC Internet Country Reports.

Geoff Huston AM is the Chief Scientist at APNIC, where he undertakes research on topics associated with Internet infrastructure, IP technologies, and address distribution policies. From 1995 to 2005, Geoff was the Chief Internet Scientist at Telstra, where he provided a leading role in the construction and further development of … More
• 52 min read
Is the DNS open? And would its being open count as a strength or a weakness? These questions lie at the heart of discussions about the future of the Internet, but to answer them, first you have to ask what 'openness' amounts to when it comes to DNS.

Kathleen Moriarty, founder of SecurityBiaS is technology strategist and board advisor, working with SaaS providers on security to Build-in at Scale benefiting both the provider and their customer base. Adjunct Professor at Georgetown SCS, teaching Security Architecture and Design and Cyber Threat Intelligence. Formerly as the Chief Technology Officer, Center … More
• 12 min read
Let’s say you’re tasked with selecting a strong authentication solution for your organisation. Where do you begin? This article is the first of a series that will explore authentication and authorisation technologies in the context of recent exploits and developing trends.

Based in Italy
Lorenzo Cogotti is a programmer and free software enthusiast. He is founder and lead of The DoubleFourteen Code Forge, an ethical software development organization promoting independent research and good software practices. More
• 7 min read
BGP Scanner from the Isolario project helped researchers analyse routing data, but it had its limitations. Overcoming these has led to the development of the Micro BGP Suite. It provides a variety of tools that, while each simple and efficient in their own operations, are capable of achieving compl…

Suzanne Taylor is a Public Policy & Internet Governance Consultant. In her work with the RIPE NCC, she engaged with a broad range of Internet stakeholders including the RIPE NCC membership, governments, law enforcement and intergovernmental organisations. From 2012 to 2016, she worked in communications at the RIPE NCC and … More
• 12 min read
This is the latest in an ongoing series in which we give a brief overview of the most pertinent digital policies currently being proposed, debated and implemented in the European Union.

Based in Berlin - Germany
Clemens studies Computer Science at Freie Universität Berlin and works at the Internet Technologies research lab, advised by Matthias Wählisch. He likes to understand BGP deployment by designing and conducting active and passive measurements. His most recent work focuses on understanding BGP Churn. More
• 9 min read
BGP Route Flap Damping (RFD) is recommended to suppress BGP churn. Default RFD configurations in routers have been shown to be harmful. Current configuration recommendations by the IETF and RIPE, however, are based on a study from 2010 which focused on IPv4 only. This article presents our recent me…

Koen van Hove is a researcher at the University of Twente on the topic of network security, with a focus on DoS-risks. His most notable contributions are to the DDoS Clearing House and RPKI Relying Party Resiliency Platform. More
• 12 min read
The security RPKI provides is clear, but what about the security of the infrastructure itself? For example, is it possible to disrupt RPKI Relying Party software by, say, introducing a malicious CA/repository into the tree? The short answer is: yes. For a longer answer, read on...

Kjerstin Burdiek is a Communications Officer at the RIPE NCC. She joined the RIPE NCC in 2021 with a background in linguistics. More
• 3 min read
TF-CSIRT is preparing to go independent, separating from GÉANT. As they take their first steps as an independent organisation, we'll be there to lend our support.