Top of Page
In this report, we will explain incidents that occurred between July and September 2010, and also examine preparations to be made for DDoS attacks on small-scale systems, discuss security considerations for shared systems such as those on cloud computing environments, and give an overview of digital forensics.
The Domain Name System is an essential part of the Internet. Here, we look back on the role of DNS, and examine the challenges and future prospects for the implementation of the DNSSEC technology that responds to the threats to DNS that are of concern today.
In this report, we will present an overview of spam trends for week 26 through week 38 of 2010. The United States replaced China as the top regional source of spam. We also discuss the implementation status of sender authentication technology and botnet countermeasures.
In February 2010, IIJ began conducting year-long proof-of-concept tests in central Japan using an outsideair-cooled container unit as part of plans to construct a next-generation modular eco-data center. Here we discuss the goals of these proof-of-concept tests, the system configuration used for testing, and the results that have been obtained so far.
End of the page.