Explained: Domain Generating Algorithm

Domain Generating Algorithms are in use by cyber criminals to prevent their servers from being blacklisted or taken down. The algorithm produces random looking domain names. The idea is that two machines using the same algorithm will contact the same d… Continue reading Explained: Domain Generating Algorithm

Hackaday Links: October 16, 2016

You need only look at the weekly user account leak from a popular web service or platform to know there’s a problem with security. Reusing passwords is the dumbest thing you can do right now, and the Mooltipass Mini is the answer to that problem. The Mooltipass originally began as a Developed on Hackaday series, and we log frequent sightings of the Multipass (maxi?) at security cons. The Mini is smaller, has exactly the same capability, and is completely unrepairable. It’s very cool, and if your email password is the same as your banking account passwords, you kind of need …read more

Continue reading Hackaday Links: October 16, 2016

Which Extensible Provisioning Protocol (EPP) status-values provide sufficient protection against domain hijacking?

The Extensible Provisioning Protocol (EPP) as described in RFC 5730, can possibly be protective against domain hijacked. The protocol consists of the 17 following status-values as described in RFC 5731:

clientDeleteProhibit… Continue reading Which Extensible Provisioning Protocol (EPP) status-values provide sufficient protection against domain hijacking?