Placed under the aegis of AFNIC (French Association for Internet Naming in Cooperation), the SYRELI procedure allows to sanction obvious and indisputable infringements of a trademarks right resulting from the registration by third parties of identical or similar domain names. Find in this “5 minutes to understand” document, available for download on Nameshield’s website, in which cases the SYRELI procedure applies and what are the rules and conditions to respect. Download ... Read More
Author: Bruno Darras
New document: 5 minutes to understand UDRP procedure
Established on ICANN’s proposal, the UDRP (Uniform Domain-Name Dispute Resolution Policy) extra-judicial procedure allows to sanction obvious and indisputable infringements of a trademark right resulting from the registration of identical or similar domain names by third parties, a practice commonly referred as “cybersquatting “. UDRP applies not only to generic extensions (gTLDs) in .aero, .biz, .com, .coop, .info, .jobs, .mobi, .museum, .name, .net, .org, .pro, .trave... Read More
New document : 5 minutes to understand SSL / TLS certificates
An SSL (Secure Socket Layer) or TLS (Transport Layer Security) certificate is a digital certificate that authenticates a server (most often a web server) and encrypts the data exchanged with it. The data is thus exchanged in confidence between two actors whose identity is known. The data exchanged cannot be spied on or altered by a third party: confidentiality and integrity. Download this document “5 minutes to understand: SSL / TLS certificates” on Nameshield’s website. ... Read More
New document : 5 minutes to understand DDoS attack
Every day, new DDoS attacks threaten the defense systems of companies and weaken networks even more. These DDoS attacks are increasing with the crisis that the world is experiencing today. Find in this document how a DDoS attack is carried out and which solutions should be chosen to stop them. Download ... Read More
New document : “5 minutes to understand: Cyberattacks – Operating Modes”
Every day, new cyberattacks threaten the defense systems of companies, and further weaken networks, cyberattacks occur exponentially. Find in this 5 minutes to understand document what are the most common cyberattacks’ operating modes and the solutions to implement to counter them. Download ... Read More