RIPE Documents and Policy Proposals
Archived Content
Mailing List Archives

It appears that you are searching for a specific IP address, range or prefix, or an ASN. Search results appear below, but you can also search for this resource in the RIPE Database.

By pressing the "Search" button you explicitly express your agreement with the RIPE Database Terms and Conditions.

The RIPE Database allows Whois queries on Internet resources.

Can't find what you're looking for? Try quotation marks around search terms with multiple words, file names, or hyphenations. It can improve your search results.
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".

Search results from ripe.net

14 items matching your search terms
1
We’d like to enable gzip compression on all of RIPE Atlas' measurement API calls — but thanks to the BREACH vulnerability, doing so could mean that some ...
2
It's possible to look at RIPE Atlas probes from the perspective of IoT - a key element of the service is the physical devices deployed all over the world. Read ...
3
More and more governments, authorities and courts are requesting censorship of Internet content. It is often done via a lying DNS resolver. Can we use RIPE ...
4
In this article we will give some insights into the overall architecture of the RIPE Atlas network and how we manage secure communication with our probe flock.
5
Microsoft ended support for Windows XP as of April 2014. We're about to change RIPE Atlas and RIPEstat to stop support for Internet Explorer 8 running on these ...
6
The Elliptic Curve Cryptography (ECC) is becoming increasingly popular in DNSSEC. While it is sometimes considered to be a remedy for the low DNSSEC adoption ...
7
We built a tool to visualise network latency measured with RIPE Atlas.
8
We used a number of RIPE NCC tools and data sets to take a quick look at the recent DDoS attack on Dyn’s infrastructure. We wanted to see if this could be ...
9
Page - On RIPE Labs
Following my recent research on DNS hijacking and the cases I have personally observed, I wondered whether this is a common practice among the operators. With ...
10
As cryptographic analysis and related technologies advance, the signing algorithms at the heart of DNSSEC have to keep up. Moritz Müller and colleagues take a ...
14 items matching your search terms