pages:files:start
This is an old revision of the document!
Files
- RIPE NCC-690 - Best Current Operational Practice for Operators: IPv6 prefix assignment for end-users - persistent vs non-persistent, and what size to choose
- M3AAWG Trust in Email Begins with Authentication - The Internet’s growth allows us to interact with people all over the world. Unfortunately, some of those people do not make good neighbors. Along with the effort to detect and filter the problematic traffic they generate, there is a complementary effort to identify trustworthy participants. In security technology parlance, the first seeks to identify Bad Actors, whereas the second creates ways of distinguishing Good Actors.
pages/files/start.1642964240.txt.gz · Last modified: 2022/01/23 18:57 by mischerh