Top of Page
In the first half of this chapter, we reflect on the IIJ Post Office Service, which IIJ retired last year after 24 years in operation. In the second half, we report on recent debate around sender authentication technology DMARC and on email route encryption observed on IIJ’s email services.
At the Virus Bulletin conference in 2021 (VB2021 localhost), I presented tools called CTO and CTO Function Lister. I have continued to improve the tools since then by adding new functionality. In this article, I explain what sort of malware analysis tasks these tools are applicable to, along with an in-the-wild malware sample.
The rapid proliferation and functional evolution of smartphones continues to change our lives in significant ways. We now use smartphones in every aspect of our daily lives. Authentication and authorization, which are crucial for ensuring that we can use Internet-based services safely, are no exception. In this article, I explain a smartphone-based authentication/authorization method called cross-device flows, something that has been attracting attention in recent years.
IIJ was the first commercial service in Japan to provide Internet access, something previously limited to academic institutions. That was in November 1993. This year marks 30 years since. In this chapter, we look back over the past 30 years with an eye on DNS.
End of the page.