Jump to content

Search the Community

Showing results for tags 'domain'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 11 results

  1. Three domains previously operated by defunct Kodi addons site TVAddons have been transferred to a law firm in Canada. With no explanation forthcoming, the security implications cannot be ignored. According to Kodi Project Manager Nathan Betzen, a third party in control of these domains could potentially do whatever they wanted to vulnerable former TVAddons users. Formerly known as XBMC, the popularity of the entirely legal Kodi media player has soared in recent years. Controversial third-party addons that provide access to infringing content have thrust Kodi into the mainstream and the product is now a household name. Until recently, TVAddons.ag was the leading repository for these addons. During March, the platform had 40 million unique users connected to the site’s servers, together transferring an astounding petabyte of addons and updates. Everything was going well until news broke last month that the people behind TVAddons were being sued in a federal court in Texas. Shortly after the site went dark and hasn’t been back since. This was initially a nuisance to the millions of Kodi devices that relied on TVAddons for their addons and updates. With the site gone, none were forthcoming. However, the scene recovered relatively quickly and for users who know what they’re doing, addons are now available from elsewhere. That being said, something very unusual happened this week. Out of the blue, several key TVAddons domains were transferred to a Canadian law firm. TVAddons, who have effectively disappeared, made no comment. The lawyer involved, Daniel Drapeau, ignored requests for an explanation. While that’s unusual enough, there’s a bigger issue at play here for millions of former TVAddons users who haven’t yet wiped their devices or upgraded them to work with other repositories. Without going into huge technical detail, any user of an augmented Kodi device that relied on TVAddons domains (TVAddons.ag, Offshoregit.com) for updates can be reasonably confident that the domains their device is now accessing are not controlled by TVAddons anymore. That is not good news. When a user installs a Kodi addon or obtains an update, the whole system is based on human trust. People are told about a trustworthy source (repository or ‘repo’) and they feel happy getting their addons and updates from it. However, any person in control of a repo can make a Kodi addon available that can do pretty much anything. When that’s getting free movies, people tend to be happy, but when that’s making a botnet out of set-top boxes, enthusiasm tends to wane a bit. If the penny hasn’t yet dropped, consider this. TVAddons’ domains are now being run by a law firm which refuses to answer questions but has the power to do whatever it likes with them, within the law of course. Currently, the domains are lying dormant and aren’t doing anything nefarious, but if that position changes, millions of people will have absolutely no idea anything is wrong. TorrentFreak spoke to Kodi Project Manager Nathan Betzen who agrees that the current security situation probably isn’t what former TVAddons users had in mind. “These are unsandboxed Python addons. The person [in control of] the repo could do whatever they wanted. You guys wrote about the addon that created a DDoS event,” Betzen says. “If some malware author wanted, he could easily install a watcher that reports back the user’s IP address and everything they were doing in Kodi. If the law firm is actually an anti-piracy group, that seems like the likeliest thing I can think of,” he adds. While nothing can be ruled out, it seems more likely that the law firm in question has taken control of TVAddons’ domains in order to put them out of action, potentially as part of a settlement in the Dish Network lawsuit. However, since it refuses to answer any questions, everything is open to speculation. Another possibility is that the domains are being held pending sale, which then raises questions over who the buyer might be and what their intentions are. The bottom line is we simply do not know and since nobody is talking, it might be prudent to consider the worst case scenario. “If it’s just a holding group, then people [in control of the domain/repo] could do whatever they can think of. Want a few million incredibly inefficient bit mining boxes?” Betzen speculates. While this scenario is certainly a possibility, one would at least like to think of it as unlikely. That being said, plenty of Internet security fails can be attributed to people simply hoping for the best when things go bad. That rarely works. On the plus side, Betzen says that since Python code is usually pretty easy to read, any nefarious action could be spotted by vigilant members of the community fairly quickly. However, Martijn Kaijser from Team Kodi warns that it’s possible to ship precompiled Python code instead of the readable versions. “You can’t even see what’s in the Python files and what they do,” he notes. Finally, there’s a possibility that TVAddons may be considering some kind of comeback. Earlier this week a new domain – TVAddons.co – was freshly registered, just after the old domains shifted to the law firm. At this stage, however, nothing is known about the site’s plans. Article source
  2. Stanners

    Free Domain

    Hi Guys Another gem this one for a free domain name. Go to: http://www.freenom.com/en/index.html?lang=en Enter the domain name you want select check availibility. Chose what domain you want Go to checkout Use drop down to select 12 Months From here enter email address and follow the bouncing ball to checkout with your new domain. After that your good to go! Again thanks to boulawan for his post about OneDrive storage. Original site the offer was posted at is http://a.v9s.win/ I just used Chrome and translated the pages if you guys want to check it out, as they some other interesting stuff
  3. By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they're able to capture a sample of the invading malware, a new study suggests. The findings point toward the need for new malware-independent detection strategies that will give network defenders the ability to identify network security breaches in a more timely manner. The strategy would take advantage of the fact that malware invaders need to communicate with their command and control computers, creating network traffic that can be detected and analyzed. Having an earlier warning of developing malware infections could enable quicker responses and potentially reduce the impact of attacks, the study’s researchers say. “Our study shows that by the time you find the malware, it’s already too late because the network communications and domain names used by the malware were active weeks or even months before the actual malware was discovered,” said Manos Antonakakis, an assistant professor in the School of Electrical and Computer Engineering at the Georgia Institute of Technology. “These findings show that we need to fundamentally change the way we think about network defense.” Traditional defenses depend on the detection of malware in a network. While analyzing malware samples can identify suspicious domains and help attribute network attacks to their sources, relying on samples to drive defensive actions gives malicious actors a critical time advantage to gather information and cause damage. “What we need to do is minimize the amount of time between the compromise and the detection event,” Antonakakis added. The research, which will be presented May 24 at the 38th IEEE Security and Privacy Symposium in San Jose, California, was supported by the U.S. Department of Commerce, the National Science Foundation, the Air Force Research Laboratory and the Defense Advanced Research Projects Agency. The project was done in collaboration with EURECOM in France and the IMDEA Software Institute in Spain – whose work was supported by the regional government of Madrid and the government of Spain. In the study, Antonakakis, Graduate Research Assistant Chaz Lever and colleagues analyzed more than five billion network events from nearly five years of network traffic carried by a major U.S. internet service provider (ISP). They also studied domain name server (DNS) requests made by nearly 27 million malware samples, and examined the timing for the re-registration of expired domains – which often provide the launch sites for malware attacks. “There were certain networks that were more prone to abuse, so looking for traffic into those hot spot networks was potentially a good indicator of abuse underway,” said Lever, the first author of the paper and a student in Georgia Tech’s School of Electrical and Computer Engineering. “If you see a lot of DNS requests pointing to hot spots of abuse, that should raise concerns about potential infections.” The researchers also found that requests for dynamic DNS also related to bad activity, as these often correlate with services used by bad actors because they provide free domain registrations and the ability to add quickly add domains. The researchers had hoped that the registration of previously expired domain names might provide a warning of impending attacks. But Lever found there was often a lag of months between when expired domains were re-registered and attacks from them began. The research required development of a filtering system to separate benign network traffic from malicious traffic in the ISP data. The researchers also conducted what they believe is the largest malware classification effort to date to differentiate the malicious software from potentially unwanted programs (PUPs). To study similarities, they assigned the malware to specific “families.” By studying malware-related network traffic seen by the ISPs prior to detection of the malware, the researchers were able to determine that malware signals were present weeks and even months before new malicious software was found. Relating that to human health, Antonakakis compares the network signals to the fever or general feeling of malaise that often precedes identification of the microorganism responsible for an infection. “You know you are sick when you have a fever, before you know exactly what’s causing it,” he said. “The first thing the adversary does is set up a presence on the internet, and that first signal can indicate an infection. We should try to observe that symptom first on the network because if we wait to see the malware sample, we are almost certainly allowing a major infection to develop.” In all, the researchers found more than 300,000 malware domains that were active for at least two weeks before the corresponding malware samples were identified and analyzed. But as with human health, detecting a change indicating infection requires knowledge of the baseline activity, he said. Network administrators must have information about normal network traffic so they can detect the abnormalities that may signal a developing attack. While many aspects of an attack can be hidden, malware must always communicate back to those who sent it. “If you have the ability to detect traffic in a network, regardless of how the malware may have gotten in, the action of communicating through the network will be observable,” Antonakais said. “Network administrators should minimize the unknowns in their networks and classify their appropriate communications as much as possible so they can see the bad activity when it happens.” Antonakakis and Lever hope their study will lead to development of new strategies for defending computer networks. “The choke point is the network traffic, and that’s where this battle should be fought,” said Antonakakis. “This study provides a fundamental observation of how the next generation of defense mechanisms should be designed. As more complicated attacks come into being, we will have to become smarter at detecting them earlier.” In addition to those already mentioned, the study included Davide Balzarotti from EURECOM, and Platon Kotzias and Juan Caballero from IMDEA Software Institute. Article source
  4. ExtraTorrent, one of the world's largest torrent indexes, has lost control over several of its key mirror domain names. The site's operator says that he's been locked out of his domain registrar's control panel following an outside complaint. The site now recommends extra.to and extratorrent.site as the new official mirrors. With millions of daily visitors ExtraTorrent is the second largest torrent site, trailing only behind The Pirate Bay. The site’s popularity puts it in the crosshairs of various entertainment industry groups, who put pressure on hosting companies and domain name services to take action. As a result, over the past several days ExtraTorrent lost control of three domain names used for its official mirror sites. Following a complaint from rightholders, extratorrent.rocks, etproxy.top and extratorrent.date are no longer available. Speaking with TorrentFreak, the site’s operator points out Subreg.cz as the culprit. The Czech domain registrar allegedly locked the torrent site out of its control panel while the domains stopped resolving. The registrar reportedly said that there’s nothing it could do to resolve the situation and recommended the torrent site to take the matter to court. “We don’t have access to the three domain names anymore. Subreg recommended us to go to court to resolve this issue, and ignored our requests,” ExtraTorrent’s SaM says. While this sounds like a typical registrar domain suspension, something more might be going on. Strangely, the registrar informed TorrentFreak that they are not responsible for the domain issues. “These domain names are not blocked from our side. We got a complaint which we sent to the account holder,” a Subreg spokesperson says, noting that they operated in compliance with ICANN rules. This comment suggests that some entity higher up the chain took action. However, the domain WHOIS information doesn’t show any typical registry or registrar suspension notices. The domains have simply been stripped of their “a records,” which means that they’re not responding. We have asked the registrar for additional information about the discrepancy, but we were told that they only disclose information to the domain owner. While ExtraTorrent lost three key mirror domains, the main ExtraTorrent.cc domain is still working as it’s registered elsewhere. The same is true for several other official mirror domains. ExtraTorrent has started pointing all their mirrors to extratorrent.site and extra.to, which are now the official backups. The site’s operator recommends the latter as it’s not blocked anywhere, yet. Article source
  5. The popular movie streaming site 123movies has started redirecting UK and Indian traffic to a new domain name to circumvent local blocking orders. The site's operators are keen to keep their service accessible around the globe to the best of their ability. Taking a page from Pirate Bay's playbook, they're also considering the launch of a network of proxy sites. Pirate movie streaming sites and services continue to gain popularity, with 123movies at the forefront of this movement. Hollywood is not happy with this trend and reported the site to the U.S. Government’s Trade Representative last month, labeling it one of the most “notorious” pirate markets. “123movies is a very popular streaming website that embeds popular movie and series content from third-party cyberlockers,” the MPAA wrote. In addition, the movie industry group applied to have 123movies blocked by UK ISPs. In response, the High Court ordered the website to be blocked, alongside a dozen other streaming portals. The people behind 123movies, who prefer to remain anonymous, fear that the blockade will hurt their visitor numbers so have decided to take counteraction. A few hours ago they started redirecting UK and Indian visitors to 123movies.gs, using a TLD from the South Georgia and the South Sandwich Islands. The reason for the sudden move is clear, according to a site representative. “To give UK users a place to stream movies after the ban on 123movies.to,” we were told. The .GS domain is not an arbitrary choice. The 123movies team believes that this is a relatively safe option. However, it’s worth noting that The Pirate Bay lost its .GS domain fairly quickly last year after the registry suspended it over copyright infringement issues. With the switch, 123movies hopes to be safe for a while but they may have to relocate UK and Indian traffic again in the future. The site’s operators say they don’t have a larger goal in mind for the site. Their main motivation is to provide free video content to the public at large, and with millions of visitors per day they are doing just that. “We have no goal, we just want to provide free movies to users all around the world,” a 123movies representative told TorrentFreak. “In some countries, it’s really expensive to buy a ticket at the cinema, and not all people can afford it. 123movies will help them to be able to enjoy their favorite movies at no cost.” The Hollywood studios will cringe at 123movies’ deviant stance and are likely to take countermeasures of their own. In the UK they can request the new domain name to be blocked as well, which they are bound to do. However, 123movies is not planning to give up anytime soon. They are thinking about starting a network of proxy sites, like The Pirate Bay has, to ensure that people will always be able to access the site. And so it appears that Hollywood has another cat and mouse game on their hands… TorrentFreak
  6. FREE Services worth Rs. 7000 with your .NET domain name. .NET domain name for FREE
  7. Openload, one of the largest file-hosting sites on the Internet, has had its domain suspended. According to the site's operator, domain registrar Namecheap took action last evening after receiving "too many DMCA complaints". Openload says all complaints are actioned within 24 hours. Copyright holders know that one of the most effective ways to hinder a file-sharing site is to attack its domain. As a result, various strategies have emerged to deprive owners of their use. Those methods range from a basic complaint to registrars over incomplete or inaccurate WHOIS entries, to the more complex seizing of domains via the legal system. The amount of time spent on enforcement is often comparable with the quality of the end results. WHOIS information is quickly fixed but domains ordered seized by a judge tend to stay that way forever. Interestingly, a situation now faced by a leading file-hosting site might lie somewhere in the middle. Openload is one of the most-used file-hosting platforms on the Internet, with more traffic than 4shared, Rapidgator and Uploaded. It has a worldwide Alexa rank of 402 and millions of visitors every week but yesterday a wrench was thrown into the works. Around 18:22 Monday, Openload’s .co domain was suspended by its registrar Namecheap. As can be seen in the entry below, the reason is reported as “abuse”. Namecheap passed our request for comment to its legal department who have yet to formally respond. However, we were able to contact the operator of Openload who confirmed that there had been an alleged breach of Namecheap’s Terms of Service. “Namecheap suspended our domain for abuse according to their TOS,” Openload’s operator told TF. “Basically, they just said that they received too many DMCA reports.” It is fairly unusual for a domain registrar to be targeted with so many copyright complaints since they are traditionally directed at the site itself, its webhost, or both. In this case, however, Namecheap appears to have been overwhelmed. To get an idea of potential scale, in less than a year Google has received in excess of 450,000 DMCA complaints against Openload’s .co and .io domains. The range of entertainment companies involved is broad, from the RIAA, Netflix and Warner Bros, to various Japanese anime distributors. Indeed, a large proportion of Openload’s traffic hails from Japan. That being said, Openload says it is DMCA-compliant and processes complaints in a timely fashion. “The complaints received by Namecheap were of course all taken down within 6-24 hours, but the number of notices is too much for them,” the site told us. Copyright holders do have other options though. In addition to inviting complaints via a standard web form, Openload also offers a takedown tool. “Openload is anxious to optimize the process of taking down files that violate copyright. Therefore Openload is offering a takedown API,” the site says. But while takedowns are important, Openload does have a feature that tends to irritate copyright holders – paying uploaders for the amount of downloads they generate. “We pay a fixed amount per 10,000 downloads/streams. Each payment amount per download/stream depends on the country the actions comes from,” the site explains on its rewards page. Of course, YouTube also pays uploaders for the amount of traffic they generate but copyright holders have traditionally drawn a line in the sand when the same is offered by Openload-type hosting sites. The U.S. Department of Justice indictment against Megaupload famously paints a loosely similar scheme in a very dim light. For now, Openload has lost control of its main Openload.co domain but the site is back up and running at Oload.co, a domain that was purchased last night following Namecheap’s suspension. “Our site is reachable via oload.co which is actually a kind of read-only site. All features will return on the new domain during the next hours,” Openload’s operator concludes. Article source
  8. StartSSL faces another issue that lets attackers obtains SSL certificates for domains they don't own StartEncrypt service logo Thijs Alkemade, a security researcher for Dutch security firm CompuTest, has discovered multiple design and implementation flaws in StartEncrypt, a tool created by Israeli company StartCom for issuing free SSL certificates. StartCom, the CA (Certificate Authority) behind the StartSSL service, launched the StartEncrypt project on June 4, inspired by the success of the Let's Encrypt project. Users who want to deploy free StartSSL certificates can take advantage of their StartEncrypt offering. They only need to download a Linux client they're supposed to upload to their servers. This client performs a domain validation process, informs the StartSSL service, which then issues and installs an "Extended Validation" SSL certificate for the domain it has found running on the server it has just checked. StartEncrypt contains design and implementation flaws According to CompuTest, this validation process is flawed, and through a few tricks, it allows server owners to receive SSL certificates issued for other domains, such as Facebook, Google, Dropbox, etc., which can be sold on the black market or used in man-in-the-middle attacks. The first issue Alkemade discovered in the StartEncrypt client was a design-related problem linked to the fact that users could manually configure the folder from where the client would download a signature from the server. An attacker would only have to point the tool to a folder on their server holding the signature of another domain. These domain signatures can be extracted from any sites that allow users to upload files: GitHub, Dropbox, etc.. StartEncrypt bug combined with OAuth 2.0 protocol condition The second issue is far more serious because it enabled an attacker to obtain SSL certificates for even more domains than the ones before. According to the researcher, one of the API verification calls contains a parameter dubbed "verifyRes," which takes a URL as input. This means the client was exposed to Open Redirect vulnerabilities. In other words, an attacker could forge this request and point the tool off-domain to a server not under their control. But this feature is not that easily exploitable. The domain URL to which the attacker needs to point the tool must (1) allow users to upload files and serve them back in raw format; or (2) to contain an Open Redirect issue of its own. While the first condition was quite rare, the second was not. All websites that support OAuth 2.0, a specification that powers social login features, must allow open redirects for the protocol to function properly. A crook leveraging this OAuth 2.0 condition and the StartEncrypt client could fool the StartSSL service into issuing a free SSL service in their name for any site that provides OAuth 2.0 support, such as Facebook, Twitter, Yahoo, Microsoft, and so on. Multiple other issues discovered as well Additionally, CompuTest also found that StartEncrypt doesn't check its own server's certificate for validity when connecting to the API, meaning crooks could receive verification requests and issue false SSL certificates for users trying to use StartEncrypt. The API also doesn't check the content type of the file it downloads for verification, so attackers can obtain certificates in the name of third-party websites where users can upload their avatars. At the same time, the certificate private key, which must be private, is stored with 0666 permissions in a public folder, so everyone could read it. Furthermore, just like Let's Encrypt, StartEncrypt is vulnerable to a Duplicate-Signature Key Selection attack. "In our opinion, StartCom made a mistake by publishing StartEncrypt the way it is," CompuTest's Christiaan Ottow explains. "Although they appreciated the issues for the impact they had and were swift in their response, it is apparent that too little attention was paid to security both in design (allowing the user to specify the path) and implementation (for instance in following redirects, static linking against a vulnerable library, and so on). Furthermore, they didn’t learn from the issues LetsEncrypt faced when in beta." StartCom has released a new version of the StartEncrypt Linux client, with the same version number 1.0.0.1. CompuTest says they reported other issues to the service, which are still being corrected and will be fixed in future updates. Back in March, StartSSL faced a similar issue with its general service, which also allowed crooks to receive SSL certificates for domains they didn't own. Article source
  9. The RIAA has sent a formal letter to the Public Interest Registry, asking it to suspend Pirate Bay's .ORG domain. The registry hasn't complied with the request but has forwarded it to Pirate Bay's registrar EasyDNS who insist the domain will stay up. So the question now is will the RIAA take the matter to court? Earlier today we wrote about the Copyright Alliance’s critique of the US-based Public Interest Registry (PIR), which is responsible for .ORG domains. The group called out the registry as hypocritical, as it allows “criminal” sites such as The Pirate Bay to use its service. A few hours later it turns out that this criticism didn’t come out of nowhere. The Pirate Bay’s registrar EasyDNS reveals that the RIAA sent PIR a letter last week, urging it to suspend the Pirate Bay’s domain. The music group lists several European court decisions against The Pirate Bay, including the criminal convictions of its founders in Sweden. It states that the torrent site is clearly operating illegally, and hopes the registry will take its domain name out of circulation. According to the RIAA, The Pirate Bay violates PIR’s anti-abuse policy and terms of service. As such, it hopes that a court order isn’t required for the registry to take action. “When, as in this case, there is overwhelming evidence of infringing and abusive activity on a domain, along with court orders from several jurisdictions with well-developed copyright jurisprudence, it cannot be the ‘right thing’ or ‘in the community interest’ to hold out for those decisions to be processed before the U.S. courts before taking action,” the RIAA writes. RIAA’s letter to the Public Interest Registry The RIAA’s letter was sent last week and thus far PIR has not taken any steps against the domain. Instead, it forwarded the RIAA’s letter to Pirate Bay’s registrar, the Canadian-based EasyDNS. TorrentFreak spoke with EasyDNS CEO Mark Jeftovic, who informs us that he doesn’t want to be seen as a refuge for torrent sites. However, he is committed to protecting due process, and for now he sees no reason to suspend the domain name. EasyDNS forwarded the letter to TPB and intriguingly, the site’s operator replied that they are DMCA compliant. In addition, they waved away any concerns about malware that was distributed through third-party ads. Infringements or not, EasyDNS says its abuse policy only covers net abuse, not copyright matters. This means that in order to get a domain suspended the RIAA would need to present a local court order, or a foreign one that’s served through the Ontario Sheriff’s Office. “We would need some kind of legal finding here in Ontario, or a foreign legal finding that has been duly served to us via the Ontario Sheriff’s Office,” Jeftovic tells us. Alternatively, EasyDNS says it will accept the outcome of a formal proceeding under ICANN’s rules and regulations. However, it won’t take action against a one-sided complaint. All in all, this means that the RIAA’s letter is unlikely to achieve the result they desire. This also begs the question, what’s next? Although the RIAA would prefer to avoid a legal case against The Pirate Bay in the United States, if only to avoid the media attention, it appears that they have few other options left than to go to court. Court case or not, the TPB team isn’t worried. They are not tied to the .ORG domain and can easily switch to an alternative. “TPB is more than just a domain, it’s a movement, and taking down one domain will have zero effect on our inalienable right to share culture with our peers,” TPB’s Spud17 told us earlier today. And so the whack-a-mole game is likely to continue. Article source
  10. On one hand, once we heard that ICANN would be selling off custom top-level domains (meaning instead of just .com, .org, or .net, you could get .anything), it was easy to assume that Google would be applying to get some of those domains. On the other hand, Google is directly responsible for the steady decline of users actually typing in full URL addresses in the first place. An annoyingly large number of users will use Google to search for "www.phonearena.com" rather than simply typing the address into the address bar. And, of course there are plenty of users who are too lazy to type the .com, and will just put "phonearena" in their Google Chome omnibox and then click away fromGoogle applies for .android, .nexus, .moto, and 98 other top-level domains there. Even so, Google has applied for an impressive 101 top-level domains. This is extra impressive because: 1) there were only 2,000 applications, meaning Google has 5% of all applications for the entire world; and, 2) the application fee alone for each of these is $185,000, meaning Google spent a cool $18.7 million just to try to obtain these domains.The list of domains that Google is applying for is varied and has the entries that you would expect, plus quite a few that are just odd. The ones you might expect include .Android, .Nexus, .Moto, .App, .YouTube, .Chrome, .Play, .Plus, .Gmail, .Google, .Search, .Hangout, and more. But, the entries you might not expect get weird and interesting very quickly, including .Dad, .Esq, .Kid, .LOL, .Meme, .PhD, and .Wow. Google hasn't really explained itself much, saying basically that it wants to "make the introduction of new TLDs a good experience for web users". It basically equates to getting more people online (so they can see more Google ads), and making them feel at home once they're on the web. Google says that it has applied for certain domains simply because of the "creative potential", like .LOL. If nothing else, this feels like Google might be building up a catalogue to sell domains like Hover or GoDaddy. Source
  11. I'm not quite sure how to phrase this query so please bear with me...?! I was using DynDNS for a hostname to map a dynamic IP for remote use for a while. Some while back I had actually paid them one time and got one of their better hostnames. Recently they changed their terms and I had to log in once a month to keep it active now that the payment is long gone. I forgot...once...it expired. The only way to get it back is to pay again and I don't want to pay them again. I know there's loads of free dynamic DNS providers and since I am far from my router I don't know which ones it will work with specifically and can't look until I visit there again. Here's what I'm curious about: I have a domain of my own - and supposing I made a subdomain of that for this=> Does anyone know if there's a way to specifically map a subdomain to another specific IP so that it could be used this way ?? I'd greatly appreciate any pointers. Thanks.
×
×
  • Create New...