RIPE Documents and Policy Proposals
Archived Content
Mailing List Archives

It appears that you are searching for a specific IP address, range or prefix, or an ASN. Search results appear below, but you can also search for this resource in the RIPE Database.

By pressing the "Search" button you explicitly express your agreement with the RIPE Database Terms and Conditions.

The RIPE Database allows Whois queries on Internet resources.

Can't find what you're looking for? Try quotation marks around search terms with multiple words, file names, or hyphenations. It can improve your search results.
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".

Search results from ripe.net

166 items matching your search terms
31
We are at a very important decision point in Internet history. Will we accept insecure and unsafe Internet of Things (IoT) devices that erode our privacy and ...
32
The current perspective on cyber security is still dominated by the technical nature of many security issues. Within the technical community there is consensus ...
33
We're celebrating reaching 10,000 generated Certificate Authorities. This is a big milestone for RPKI and proof that more operators are seeing the need for ...
34
Today, between 12:30 - 15:00 (UTC+1) the RIPE NCC will carry out emergency maintenance work a number of core services. This is due to an announced security ...
35
In this article we explain why we will be using Zoom for the upcoming RIPE 80 and RIPE NCC General Meeting, and we outline the policies and settings we have in ...
36
Page - On RIPE Labs
"For well over a decade I have been concerned about the blind trust that exists in the technical world." Merike Kaeo, a global expert in information security, ...
37
The RIPE NCC and Juniper Networks are co-hosting the first RPKI deployathon in March 2019 - a two-day event which will bring together network professionals to ...
38
We wanted to find out what network security experts think about network anomalies. We created a short web survey in order to map opinions of network ...
39
In this post (originally published on the APNIC blog), Cengiz Alaettinoglou gives a brief overview and comparison of the IRR and SIDR security models and ...
40
There is an increased interest in the security and privacy impacts of software used for slowing down the spread of the COVID-19 epidemic. In this article, we ...
166 items matching your search terms