Banner image

Network Operations

All articles

The RIPE NCC's Use of Zoom for Meetings

The RIPE NCC's Use of Zoom for Meetings

Author image
Kaveh Ranjbar

9 min read

In this article we explain why we will be using Zoom for the upcoming RIPE 80 and RIPE NCC General Meeting, and we outline the policies and settings we have in place to address concerns about privacy and security.

Article tags:

5 Likes are disabled for this article.
8
Validating RPKI Validators

Validating RPKI Validators

Author image
Mirjam Kühne

5 min read

In this guest post Drikus Brits describes some results and take-aways from the RPKI Deployathon that took place during APRICOT 2020.

Article tags:

0 Likes are disabled for this article.
2
Ten Requirements for the Evaluation of Contact Tracing Apps

Ten Requirements for the Evaluation of Contact Tracing Apps

Author image
Vesna Manojlovic

8 min read

There is an increased interest in the security and privacy impacts of software used for slowing down the spread of the COVID-19 epidemic. In this article, we republish the Chaos Computer Club (CCC) recommendations for your information.

Article tags:

0 Likes are disabled for this article.
3
What COVID-19 Means for Network Security

What COVID-19 Means for Network Security

Author image
Gary Stevens

4 min read

In this article, we’ll take a look at ways that the pandemic is changing network security.

Article tags:

0 Likes are disabled for this article.
0
For a Safer Internet - Instructions to Use RPKI

For a Safer Internet - Instructions to Use RPKI

Author image
Flavio Luciani

1 min read

We wrote a user guide to help the community to understand the importance of deploying the BGP RPKI architecture and to give some practical guidelines to implement it in production networks.

Article tags:

1 Likes are disabled for this article.
0
Internet Stability in Times of Corona

Internet Stability in Times of Corona

Author image
Emile Aben

4 min read

In this article we're sharing observations we made in the RIPE Routing Information System (RIS), our Internet data plane observatory.

Article tags:

0 Likes are disabled for this article.
3
The Best Laid Plans…

The Best Laid Plans…

Author image
João Luis Silva Damas

3 min read

For just over 10 years now, every three months, a diverse group of “Trusted Community Representatives” [1] get together in one of two data centres in the USA and follow an agreed script to sign a batch of Key Signing Requests (KSRs) provided by Verisign that, once returned with the proper signature…

Article tags:

8 Likes are disabled for this article.
1
Reporting back from 36c3: Resource Exhaustion

Reporting back from 36c3: Resource Exhaustion

Author image
Vesna Manojlovic

11 min read

Watching the videos from the Chaos Communication Club (CCC) is both an entertaining and educational activity. Our 2020 focus on sustainability has inspired me to share my favourite moments that seem most relevant to the RIPE Community and RIPE Labs audiences.

Article tags:

12 Likes are disabled for this article.
0
What’s the Deal with IPv6 Link-Local Addresses?

What’s the Deal with IPv6 Link-Local Addresses?

Author image
Philip Homburg

8 min read

...or, how RIPE Atlas measurement data just got a little bit more complex. Some people say IPv6 is "96 more bits, no magic". And while this is true for most network operators, if you're a RIPE Atlas system programmer, you can run into interesting situations. In this article, we described how link-l…

Article tags:

7 Likes are disabled for this article.
7
Detecting and Taking Down Fraudulent Webshops at the .nl ccTLD

Detecting and Taking Down Fraudulent Webshops at the .nl ccTLD

Author image
Giovane Moura

10 min read

In this article, we describe how we detected a large number of fraudulent sites using tools developed by SIDN Labs.

Article tags:

2 Likes are disabled for this article.
0

Showing 892 article(s)