User Tools

Site Tools


pages:files:start

This is an old revision of the document!


Files

  • RIPE NCC-690 - Best Current Operational Practice for Operators: IPv6 prefix assignment for end-users - persistent vs non-persistent, and what size to choose
  • M3AAWG Trust in Email Begins with Authentication - The Internet’s growth allows us to interact with people all over the world. Unfortunately, some of those people do not make good neighbors. Along with the effort to detect and filter the problematic traffic they generate, there is a complementary effort to identify trustworthy participants. In security technology parlance, the first seeks to identify Bad Actors, whereas the second creates ways of distinguishing Good Actors.
This website uses cookies. By using the website, you agree with storing cookies on your computer. Also you acknowledge that you have read and understand our Privacy Policy. If you do not agree leave the website.More information about cookies
pages/files/start.1642964038.txt.gz · Last modified: 2022/01/23 18:53 by mischerh