Documentation of Shine

Total Page:16

File Type:pdf, Size:1020Kb

Documentation of Shine Documentation of SHiNE bachelorproject ws 07/08 March 31, 2008 Abstract SHiNE - Security and Hacking in Network Environments is a students Bachelor project based on the Master project NetS-X. The target of this project is an implementation of a learning environment, which leads the user through network specific problems and security tasks. 2 Contents 1 Objectives [ar, rb] 7 2 Competitor analysis [dl, pm] 7 2.1 Overview . .7 2.2 Applied security laboratory . .8 2.3 Tele-Lab IT-Security . .8 2.4 Cyber Ciege . .8 3 2D-Game 8 3.1 Description of 2D Game[cs] . .8 3.2 Overall story [fe, af, sg] . .9 3.3 Sequence chart[fe, af, sg] . 10 3.4 Integration items/characters in overall story [sg, fe, af] . 11 3.5 In-Game assistance [sg, fe, af] . 13 3.6 Behavior NPCs (Implementation XML)[sg, fe, af] . 13 3.7 Realisation Flash-Client[cs, ju] . 14 3.7.1 Implementation . 15 3.7.2 State Machine . 16 3.7.3 Gameobjects(NPCs, items, trigger areas) . 18 3.7.4 Tile editor . 19 3.7.5 Waypoint editor [dl] . 20 4 Description of Game Topology [ts] 22 5 Scenarios 23 5.1 Basic scenarios [jp] . 23 5.1.1 Console . 23 5.1.2 Vi . 25 5.2 Man-in-the-middle scenarios . 26 5.2.1 ARP-Spoofing [rb] . 26 5.2.2 Hijacking[rb] . 29 3 5.2.3 SSL-Cracking [aoe] . 31 5.3 Passwort Hacking [ts] . 32 5.3.1 John the Ripper . 32 5.3.2 Cron John . 33 5.3.3 Hydra . 34 5.4 Honeyd [pm] . 35 5.4.1 honeypot detection . 35 5.5 Monitoring Tools [cg] . 37 5.5.1 Cacti . 37 5.6 IDS scenarios [jl] . 39 5.6.1 Run snort . 39 5.6.2 Create snort rule . 40 5.7 DNS [mt] . 42 5.7.1 DNS Basics . 42 5.7.2 DNS Server manipulation . 43 5.7.3 DNS-Spoofing . 44 5.7.4 Domain . 46 5.8 Learning scenarios [ts] . 47 5.8.1 LDAP . 47 5.8.2 RADIUS . 47 6 Overall System Conventions and Design [ar, dg, sd, tr] 48 6.1 Conventions . 48 6.1.1 Overall Systemconcept [ar, sd, tr] . 48 6.1.2 Overall Designconcept [ar, dg, sd, tr] . 49 6.1.3 Namefinding [ar] . 52 6.1.4 Styleguide [dg] . 52 6.1.5 Rights [tr] . 58 6.2 Webinterface [ar, dg, sd, tr] . 60 6.2.1 Login / Registration [dg] . 61 6.2.2 PDA-Screens [ar, sd] . 61 4 6.2.3 Administration Screen [master] . 63 6.3 2D Gamedesign . 64 6.3.1 The Flashgame Graphics [tr, ar] . 64 6.3.2 The Characters [dg, mf] . 64 6.4 Implementation MVCs in CakePHP [sd] . 65 7 Overall Gameplay-Improvements [af, sg, tr] 66 7.1 Enhancements in Communications . 66 7.2 Improvements to the game itself . 66 7.3 Missions . 67 7.4 Graphics . 67 7.5 Real world and 2D-Game relationship . 68 7.6 Content creation for the 2D-Game . 68 A Capability planning[fe] 68 A.1 Personnel planning . 68 A.2 Time management with Gantt-Diagram . 69 B External presentation 71 B.1 Flyer, poster, handouts [dg, cs] . 71 B.2 Website [rb, ar] . 73 C 2D-Game 74 C.1 Script[fe, af, sg] . 74 C.2 Realisation Flash-Client[cs, ju] . 80 C.2.1 Game server interface [cs, ju] . 80 C.2.2 The tile map [cs, ju] . 83 C.2.3 Scene management and animations [cs] . 85 C.2.4 Pathfinding [cs, ju] . 86 C.2.5 Class diagram [cs, ju] . 89 5 D Game topoloy 90 D.1 Manual Net Topology installation [jl, mt, aoe] . 90 D.1.1 Activate Topology at the PC's . 90 D.1.2 Setting up the Network devices . 91 D.2 Manual Game server installation [sd] . 91 D.2.1 Linux installation . 91 D.2.2 Windows installation . 92 E Scenarios 93 E.1 Basic scenarios [jp] . 93 E.1.1 Console . 93 E.1.2 Vi . 97 E.2 Man-in-the-middle scenarios . 102 E.2.1 ARP-Spoofing [rb] . 102 E.2.2 Hijacking[rb] . 114 E.2.3 SSL-Cracking [aoe] . 125 E.3 Passwort Hacking [ts] . 132 E.3.1 John the Ripper . 132 E.3.2 Cron John . 138 E.3.3 Hydra . 144 E.4 Honeyd [pm] . 147 E.5 Monitoring Tools [cg] . 152 E.5.1 Cacti . 152 E.5.2 Ntop . 161 E.6 IDS scenarios [jl] . 162 E.6.1 Run snort . ..
Recommended publications
  • Intellectual Property Law in Cyberspace
    Intellectual Property Law in Cyberspace Second Edition CHAPTER 7 UNIQUE ONLINE TRADEMARK ISSUES Howard S. Hogan Stephen W. Feingold Gibson, Dunn & Crutcher Kilpatrick, Townsend & Stockton Washington, D.C. New York, NY CHAPTER 8 DOMAIN NAME REGISTRATION, MAINTENANCE AND PROTECTION Howard S. Hogan Stephen W. Feingold Gibson, Dunn & Crutcher Kilpatrick, Townsend & Stockton Washington, D.C. New York, NY Intellectual Property Law in Cyberspace Second Edition G. Peter Albert, Jr. and American Intellectual Property Law Association CHAPTER 7 UNIQUE ONLINE TRADEMARK ISSUES CHAPTER 8 DOMAIN NAME REGISTRATION, MAINTENANCE AND PROTECTION American Intellectual Property Law Association A Arlington, VA Reprinted with permission For more information contact: bna.com/bnabooks or call 1-800-960-1220 Copyright © 2011 The Bureau of National Affairs, Inc. Library of Congress Cataloging-in-Publication Data Albert, G. Peter, 1964– Intellectual property law in cyberspace / G. Peter Albert, Jr. -- 2nd ed. p. cm. Includes bibliographical references and index. ISBN 978-1-57018-753-7 (alk. paper) 1. Industrial property--United States. 2. Computer networks--Law and legislation--United States. 3. Internet 4. Copyright and electronic data processing--United States. I. Title. KF3095.A77 2011 346.7304’8--dc23 2011040494 All rights reserved. Photocopying any portion of this publication is strictly prohibited unless express written authorization is first obtained from BNA Books, 1231 25th St., NW, Washington, DC 20037, bna.com/bnabooks. Authorization to photocopy items for internal or personal use, or the internal or personal use of specific clients, is granted by BNA Books for libraries and other users registered with the Copyright Clearance Center (CCC) Transactional Reporting Service, provided that $1.00 per page is paid directly to CCC, 222 Rosewood Dr., Danvers, MA 01923, copyright.com, Telephone: 978-750-8400, Fax: 978-646-8600.
    [Show full text]
  • INDIA NON JUDICIAL Government of National Capital Territory of Delhi E
    INDIA NON JUDICIAL Government of National Capital Territory of Delhi e-Stamp Certificate No. IN-DL60960205740197L Certificate Issued Date 11-Sep-2013 04:14 PM Account Reference IMPACC (IV)/ dl839203/ DELHI/ DL-DLH Unique Doc. Reference SUBIN-DLDL83920320383381180966L Purchased by SANJAY KUMAR SINGH ARBITRATOR Description of Document Article 12 Award Property Description NA Consideration Price (Rs.) 0 (Zero) First Party SANJAY KUMAR SINGH ARBITRATOR Second Party Not Applicable Stamp Duty Paid By SANJAY KUMAR SINGH ARBITRATOR Stamp Duty Amount(Rs.) 100 (One Hundred only) BEFORE SHRI SANJAY KUMAR SINGH ARBITRATOR IN DOMAIN NAME DISUPTE RESOLUTION POLICY (INDRP) IN RE: MICROSOFT CORPORATION ONE MICROSOFT WAY REDMOND WA 98052-6399. USA COMPLAINANT Versus PIYUSH SOMANI, ESDS SOFTWARE SOLUTIONS PRIVATE LIMITED B-24 & B-25, NICE INDUSTRIAL AREA. SATPUR MIDC. NASHIK-422 007 INDIA RESPONDENT Disputed Domain Name: <micorsoft.co.in> The complainant has filed the present Complaint for decision in accordance with the IN Domain Name Dispute Resolution policy (the police), and the INDRP Rules of procedure (the Rules) of the IN Registry 1. The parties are: The Complainant in this administrative proceeding is MICROSOFT CORPORATION ONE MICROSOFT WAY, REDMOND, WA 98052-6399. USA The Complainant's contact details are: Address ONE MICROSOFT WAY, REDMOND, WA 98052-6399. USA The Complainant's authorized representative in this administrative proceeding is: A) Name: Pravin Anand Address: Anand and Anand. First Channel, plot No 17A, Sector 16A, Film City, Noida Telephone: 91-120- 4059300. Fax: 91-120-4243056. E-mail: [email protected] B) Name: Nischal Anand Address: Anand and Anand. First Channel, plot No 17A Sector 16A, Film City, Noida, India Telephone 91-120-4059300 Fax: 91-120-4243056 E-mail nischal@anandandanana com.
    [Show full text]
  • New Gtld Application Submitted to ICANN By: Little Birch, LLC
    Little Birch, LLC Contact Information Redacted Mr. Jon Nevett Ms. Crystal Ondo Contact Information Redacted Minds + Machines Group Limited Contact Information Redacted Ms. Reg Levy Contact Information Redacted THIS DOCUMENT IS IMPORTANT AND REQUIRES YOUR IMMEDIATE ATTENTION. If you are in any doubt about the contents of this Document, or the action you should take, you should consult a person authorised under the Financial Services and Markets Act 2000 who specialises in advising on the acquisition of shares and other securities in the United Kingdom before taking any action. Defined terms in this Document have the meanings given on page s8to13 , unless the context requires otherwise. Application will be made for the Shares to be readmitted to trading on AIM. AIM is a market designed primarily for emerging or smaller companies to which a higher investment risk tends to be attached than to larger or more established companies. AIM securities are not admitted to the Official List of the United Kingdom Listing Authority. A prospective investor should be aware of the risks of investing in such companies and should make the decision to invest only after careful consideration and, if appropriate, consultation with an independent financial advisor. The London Stock Exchange Plc has not itself examined or approved the contents of this Document. Each AIM company is required pursuant to the AIM Rules for Companies to have a nominated adviser. The nominated adviser is required to make a declaration to the London Stock Exchange on admission to the market in the form set out in Schedule Two to the AIM Rules for Companies.
    [Show full text]
  • ICANN's "Uniform Dispute Resolution Policy"– Causes and (Partial) Cures
    ICANN's "Uniform Dispute Resolution Policy"– Causes and (Partial) Cures A. Michael Froomkin Professor, University of Miami School of Law http://www.law.tm DRAFT Sept. 11, 2001 Subject to change Please check with author before quoting or citing This document at http://www.law.miami.edu/~froomkin/articles/udrp.pdf Contents Pre-History of the UDRP ............................................................ 5 The White Paper ............................................................. 12 The WIPO Process ........................................................... 14 WIPO’s Final Report ......................................................... 19 Leveraging the DNS ................................................... 20 Scope ............................................................... 21 ‘Administrative’ Process ................................................ 22 Substantive rules ...................................................... 23 Similarity ............................................................ 23 'Rights or Legitimate Interests' ........................................... 24 Bad Faith ............................................................ 27 Offers to Sell. ......................................................... 27 Commercial Confusion ................................................. 28 Repeat Players ........................................................ 28 Unfair Competition .................................................... 28 Meta questions ........................................................ 29 The
    [Show full text]
  • An Investigation Into the Legal Status of Internet Domain Names
    AN INVESTIGATION INTO THE LEGAL STATUS OF INTERNET DOMAIN NAMES A THESIS SUBMITTED TO THE UNIVERSITY OF MANCHESTER FOR THE DEGREE OF DOCTOR OF PHILOSOPHY (PHD) IN THE FACULTY OF HUMANITIES 2014 By Mohammad Al Ramahi LLB, LLM School of Law TABLE OF CONTENTS 1. ABSTRACT ...................................................................................................9 2. DECLARATION.............................................................................................10 3. COPYRIGHT STATEMENT..........................................................................10 4. THESIS OVERVIEW, FRAMEWORK AND METHODOLOGY.................11 Overview of the Key Themes of the Thesis ........................................11 Competition Law Issues ......................................................................12 Domain Names as Property .................................................................13 Methodology........................................................................................16 Structure of the Thesis..........................................................................18 CHAPTER ONE ICANN AS A CUSTODIAN OF DOMAIN NAME REGULATION ..............................20 1. Introduction..........................................................................................................................20 1.1 ICANN as a Custodian of Domain Name Regulation: The Development of a Global System of Domain Name Allocation and Assignment 20 1.1.1 The Demand for a Global System of Dispute Resolution.......................22
    [Show full text]
  • UDRP a Study by the Max-Planck-Institute for Foreign
    UDRP UDRP A Study by the Max-Planck-Institute for Foreign and International Patent, Copyright and Competition Law, Munich in Cooperation with Institute for Intellectual Property Law and Market Law, University of Stockholm Institute for Information Law, Technical University of Karlsruhe written by Dr. Annette KUR, Max-Planck-Institute, Munich file:///G|/UDRP-final-02.htm (1 von 65) [15.01.2002 12:02:01] UDRP Contents I. Introduction 1. Initial Remarks 2. Historical Background: How the UDRP Was Developed 3. About the UDRP 3.1 Basic Facts & Statistics 3.2 The Legal Nature of the UDRP 4. The UDRP in the Literature (Overview) II The Study 1. Method 1.1 Warming Up: The Pre-Study 1.2 Statistical Evaluation 2. Results 2.1 Number of Cases Appraised 2.2 The Outcome in General 2.3 Specific Results 2.3.1 Issues Concerning Art. 4 a (i) 2.3.1.1 Complainant’s Right 2.3.1.2 Degree of Similarity 2.3.1.3 Kind of Similarity file:///G|/UDRP-final-02.htm (2 von 65) [15.01.2002 12:02:01] UDRP 2.3.2 Issues Concerning Art. 4 a (ii), 4 c 2.3.1.4 Respondent’s Rights and Legitimate Interests 2.3.1.4.1 General Remarks 2.3.1.4.2 Respondent is the Owner of an Independent Right 2.3.1.4.3 Respondent is Authorized or Has Other Links With the Right Holder 2.3.2.1.4 Authorization by Third Parties 2.3.2.1.5 Business Plans 2.3.2.1.6 Nicknames, Pet Names 2.3.2.1.7 (Other Cases of) Fair Use, Free Speech 2.3.2.1.8 Descriptiveness as a General Excuse 2.3.1.5 Reverse Hijacking 2.3.1.6 Default 2.3.2 Issues Concerning Art.
    [Show full text]
  • Doménová Jména a Doménové Spory
    Právnická fakulta Masarykovy univerzity Právo a právní věda Ústav práva a technologií DIPLOMOVÁ PRÁCE Doménová jména a doménové spory Ondřej Vévoda 2010/2011 Prohlašuji, ţe jsem diplomovou práci na téma: Doménová jména a doménové spory zpracoval sám. Veškeré prameny a zdroje informací, které jsem pouţil k sepsání této práce, byly citovány v poznámkách pod čarou a jsou uvedeny v seznamu pouţitých pramenů a literatury. 2 Rád bych poděkoval JUDr. Radimu Polčákovi, Ph.D. za vedení práce, odborné konzultace a připomínky k textu. 3 Obsah 1 Úvod ............................................................................................................................................. 6 2 Základní výklady k doménovým jmenům ................................................................................... 8 2.1 Doménové jméno.................................................................................................................. 10 2.2 Funkce, stavba a struktura doménových jmen ..................................................................... 10 2.3 Domény vrcholné úrovně: národní, generické domény; IDN .............................................. 12 2.3.1 gTLDs .............................................................................................................................. 12 2.3.2 ccTLDs ............................................................................................................................. 13 2.4 Domény druhého a n-tých řádů ...........................................................................................
    [Show full text]
  • 2019 Thomson Reuters. No Claim to Original US Government Works. 1 6
    Holland, H Brian 3/1/2019 For Educational Use Only § 22:39.On-line practices—Domain names—ICANN's Uniform..., 6 Callmann on Unfair... 6 Callmann on Unfair Comp., Tr. & Mono. § 22:39 (4th Ed.) Callmann on Unfair Competition, Trademarks and Monopolies (4th Edition) | December 2018 Update Louis Altman a0 Malla Pollack a0 Part VI. Trade Identity Law Chapter 22. Varieties of Trade Identity Infringement III. Analyses of Specific Practices A. On-Line Practices § 22:39. On-line practices—Domain names—ICANN's Uniform Dispute Resolution Policy (UDRP) The policy followed by the original domain name registrar, Network Solutions, Inc., offered little in the way of extra-judicial assistance in domain name disputes; it merely placed the problematic domain name “on hold” if the complainant had a trademark registration for a mark identical to the bottom level of the offending domain name. A domain name registrar is not itself liable for permitting registration of an offending domain name, because the mere acceptance of the domain for registration is not a trade identity use thereof by the registrar. 1 Similarly, a domain name registrar is not contributorily liable for trademark infringement committed by one who misappropriates a domain name which a plaintiff had registered with that registrar. 2 Currently, multiple domain name registrars exist. The responsibility for governing the.com, .net, and.org top level domains belongs to the Internet Corporation for Assigned Names and Numbers (ICANN). 3 Effective Jan. 1, 2000, ICANN adopted the Uniform Dispute Resolution Policy (UDRP) 4 for resolving domain name disputes within these domains, to which all registrants are contractually bound to submit.
    [Show full text]
  • How Unrestrained Arbitration Decisions Have Corrupted the Uniform Domain Name Dispute Resolution Policy
    Federal Communications Law Journal Volume 53 Issue 3 Article 5 5-2001 The Best Laid Plans: How Unrestrained Arbitration Decisions Have Corrupted the Uniform Domain Name Dispute Resolution Policy Ian L. Stewart Indiana University School of Law Follow this and additional works at: https://www.repository.law.indiana.edu/fclj Part of the Communications Law Commons, Dispute Resolution and Arbitration Commons, Internet Law Commons, and the Legislation Commons Recommended Citation Stewart, Ian L. (2001) "The Best Laid Plans: How Unrestrained Arbitration Decisions Have Corrupted the Uniform Domain Name Dispute Resolution Policy," Federal Communications Law Journal: Vol. 53 : Iss. 3 , Article 5. Available at: https://www.repository.law.indiana.edu/fclj/vol53/iss3/5 This Note is brought to you for free and open access by the Law School Journals at Digital Repository @ Maurer Law. It has been accepted for inclusion in Federal Communications Law Journal by an authorized editor of Digital Repository @ Maurer Law. For more information, please contact [email protected]. The Best Laid Plans: How Unrestrained Arbitration Decisions Have Corrupted the Uniform Domain Name Dispute Resolution Policy Ian L. Stewart* I. INTRODUCTION ...........................................................................510 II. CREATION OF THE UNIFORM DOMAIN NAME DISPUTE RESOLUTION PO CY ..................................................................511 A. The Formationof ICANN ...................................................512 B. Cybersquattingand Reverse Domain
    [Show full text]
  • Reverse Domain Hijacking Fahed.W Debrecen
    Journal of Advance Research in Social Science and Humanities ISSN: 2208-2387 REVERSE DOMAIN HIJACKING FAHED.W DEBRECEN UNIVERSITY HUNGARY Legal researcher: [email protected] Prologue There is often a conflict between domain names owners and trademarks holders’ rights, and If a party has a specific domain name but the other party owns trademark rights with that name, it's likely that there's a problem, one of these problems presented by domain names hijacking. From a legal perspective, domain names hijacking taking important place in cyberspace challenges, in this scenario, domain names rights are infringed when a third party managed to transfer a domain name to his account without illegal right to be able to resell it and gain money Assumption The point of this research arises from that UDPR policy is not enough to solve the reverse domain hijacking phenomena, and then comprehensive legislation is needed to solve this phenomenon. Methodology The methodology will depend on inductive approach based on Selected and analyses court decisions with legal texts. This paper will try to provides scholarly appraisal of the legal and policy related to domain names hijacking Keywords domain names, hijacking, Reverse hijacking, RDNH, ACPA research plan this short paper will try to address some issues like: - Definition of Reverse domain hijacking, - mechanism of Reverse domain hijacking, - Anticybersquatting Consumer Protection Act - UDRP restrictions on reverse domain name hijacking - Lanham act - effects of Reverse domain hijacking, - - Volume-5 | Issue-4 | April,2019 1 Journal of Advance Research in Social Science and Humanities ISSN: 2208-2387 List of Abbreviations - RDNH: Reverse Domain Name Hijacking Information.
    [Show full text]
  • Case 2:08-Cv-01174-PMP-GWF Document 1 Filed 09/05/2008 Page 1 of 27
    Case 2:08-cv-01174-PMP-GWF Document 1 Filed 09/05/2008 Page 1 of 27 1 Clarke Douglas Walton Nevada Bar No. 9712 2 Walton Law Firm, P.C. 3 8275 S. Eastern Ave. Suite 200 Las Vegas, Nevada 89123 4 [email protected] (702) 255-9900 5 Fax: (877) 324-1899 6 Stevan Lieberman 7 Pro Hac Vice Pending Greenberg & Lieberman, LLC 8 2141 Wisconsin Ave., NW 9 Suite C2, Washington, DC 20007 [email protected] 10 (202) 625-7000 Fax: (202) 625-7001 11 12 Attorneys for Plaintiff Greg Ricks 13 14 (702) 255-9900 UNITED STATES DISTRICT COURT (877) 324-1899 fax Walton Law Firm, PC Las Las Vegas, Nevada 89123 15 8275 S. Eastern 200Suite Ave. DISTRICT OF NEVADA 16 17 Gregory Ricks CASE NO. 18 4702 Johnson Creek Loop College Station, TX 77845 19 COMPLAINT FOR DECLARATORY 20 Plaintiff, JUDGMENT AND INJUNCTIVE v. RELIEF 21 22 Bmezine.com, LLC (1) Reverse Domain Name Hijacking 1802 N. Carson Street under 15 U.S.C. § 1114(2)(D)(v) 23 Carson City, Nevada 89701 (2) Service Mark Infringement 24 Defendant. under 15 U.S.C. § 1125(a) 25 (3) Common Law Trademark 26 Infringement 27 28 JURY TRIAL DEMANDED 1 Case 2:08-cv-01174-PMP-GWF Document 1 Filed 09/05/2008 Page 2 of 27 1 COMPLAINT 2 Plaintiff, Gregory Ricks (hereinafter “Ricks”), by his undersigned counsel, Clarke 3 Douglas Walton of Walton Law Firm, P.C. and Stevan H. Lieberman of Greenberg & 4 Lieberman, LLC, for its complaint against Bmezine.com, LLC.
    [Show full text]
  • The Merging of Two Worlds? Cyber Law and Trade Law Normative
    ARTICLE_CHAISSE_FORMATTED (DO NOT DELETE) 7/17/2019 12:18 PM THE MERGING OF TWO WORLDS? CYBER LAW AND TRADE LAW NORMATIVE CONVERGENCE ON INTERNET DOMAIN NAMES Julien Chaisse ABSTRACT If the Internet were a national economy, it would rank in the world's top five. In the coming years, online economies will play an even larger role in the economies of both developed and developing countries. In this booming economy, Internet domain names play an important role as they reflect the business and activities of all companies. Domain names are assets that belong to economic actors and for which they fight. The Comprehensive and Pro- gressive Agreement for Trans-Pacific Partnership Article 18.28 imposes cer- tain requirements on each Party with respect to the management of its coun- try-code top level domain (ccTLD) names which will be analyzed in this Article. These requirements include ensuring there is available a low cost, fair and equitable, and not overly burdensome dispute settlement procedure that does not preclude resort to court litigation. The Article also requires each Party to provide, in connection with a Party’s system for the management of ccTLD names, appropriate remedies when a person registers or holds a do- main name that is identical or confusingly similar to a trademark with bad faith intent to profit. There is already a great number of disputes which can only increase in number and magnitude. For a decade, the ICANN has adopted administrative proceedings for resolving domain name disputes out- side of the court system–the Uniform Domain-Name Dispute-Resolution Policy.
    [Show full text]