TITLE

No Phishing Zone

AUTHOR(S)
Greenberg, Andy
PUB. DATE
April 2009
SOURCE
Forbes Asia;4/27/2009, Vol. 5 Issue 7, p30
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on how two cyber-security enthusiasts David Ulevitch and Daniel Kaminsky created a Domain Name System (DNS) service for Internet security. Kaminsky told Ulevitch about a flaw in the Internet which allowed hackers to hijack traffic. Ulevitch created a specialized DNS service which made finding Web addresses faster and more reliable. In November 2005, Ulevitch met Halsey Minor, founder of Cnet, and the two came up with the idea of using the service as a business opportunity.
ACCESSION #
42637532

 

Related Articles

  • Paper a Victim of Domain Name Theft. Graves, Brad // San Diego Business Journal;1/8/2001, Vol. 22 Issue 2, p10 

    Focuses on how companies suffer the temporary loss of Internet domain names due to computer hackers. Boating newspaper chain The Log's recovery of its domain name after traffic to the address was routed to another server; How a hacker rerouted traffic meant for Nike to servers in Scotland;...

  • Putting the Web in a BIND. Babcock, Charles // Interactive Week;3/12/2001, Vol. 8 Issue 10, p24 

    Focuses on the Berkeley Internet Name Domain (BIND) that Domain Name System servers use. Information the problem associated with running BIND; Functions of BIND; Vulnerability of BIND to hackers.

  • SNAPSHOT THE ROAD LESS TRAVELED. Wilson, Sara // Entrepreneur;Jan2008, Vol. 36 Issue 1, p51 

    The article profiles entrepreneur David Ulevitch and offers information on his cyberspace company OpenDNS in San Francisco, California. After he founded his firm, he introduced his own Domain Name System (DNS) service that offers a more reliable and faster Internet connection. With a $2 million...

  • Make a name for yourself with your site. Goldsborough, Reid // Business Journal (Central New York);11/17/2006, Vol. 20 Issue 46, p14 

    The author reflects on issues concerning the Web site's domain name, an address in a Web site expressed in an individual and memorable way. The author provided some tips about the domain-registration process, including the careful selection of a name and acting quickly after having chosen the...

  • WHEN A YEAR IS A LIFETIME. Ben-Itzhak, Yuval // Computer Weekly;4/17/2007, p38 

    The article presents views of the author regarding computer security. The key security trend towards the end of 2006 was dynamic code obfuscation, a technique that scrambles malicious code into incomprehensible gibberish. Trends in early 2007 continue to point to the fact that the web has become...

  • LYNX CHEERS AS FTC SHUTS DOWN SCAM. Katt, Spencer F. // eWeek;02/26/2001, Vol. 18 Issue 8, p82 

    Reports developments in the computer industry in the United States as of February 2001. Conviction of a company for illegal registration of Internet domain names by the Federal Trade Commission; Speculation on the plan of TurboLinux to acquire Linuxcare; Changes made in the domain registration...

  • I ATTENDED THIS HACKER CONFERENCE AND ALL I GOT WAS ALL THE DATA ON YOUR HARD DRIVE. Mejia, Robin // Popular Science;May2005, Vol. 266 Issue 5, p70 

    Focuses on the Capture the Flag competition included in the Def Con, a hacker conference held in Las Vegas, Nevada in July 2004. Implications of the growing popularity of wireless communications for hackers; Background on John Viega, chief technology officer and participant in the competition;...

  • Domain Hijacking.  // Network Dictionary;2007, p159 

    A definition of the term "Domain Hijacking" is presented. It refers to an instance in which an attacker takes over a domain by first blocking access to the domain's Domain Name System server and then putting his or her own server up in its place.

  • Walking the Line. Gilmore, Agatha // Certification Magazine;Oct2009, Vol. 11 Issue 10, p2 

    The author reflects on cybersecurity in the U.S. She mentions the gray hats, a new breed of information technology (IT) professionals, who employ their knowledge in IT to hack into computer networks. She notes that more of these gray areas in computer data security will be seen in the future as...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics