{"id":1079,"date":"2020-07-20T14:57:15","date_gmt":"2020-07-20T13:57:15","guid":{"rendered":"https:\/\/www.nameshield.com\/en\/?page_id=1079"},"modified":"2023-02-10T12:10:02","modified_gmt":"2023-02-10T11:10:02","slug":"5-minutes-to-understand","status":"publish","type":"page","link":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/","title":{"rendered":"5 minutes to understand\u2026"},"content":{"rendered":"\n<div class=\"wp-block-group alignwide eplus-wrapper\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-block-columns alignwide eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-ad42b1\"><div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-07564a\">\n<h2 class=\"eplus-wrapper wp-block-heading\">The reading of a domain name<\/h2>\n\n\n\n<p class=\" eplus-wrapper\">A domain name is main\u00adly used to iden\u00adti\u00adfy the address of a web\u00adsite and for the e\u2011mail sys\u00adtem. Easy to iden\u00adti\u00adfy, mem\u00ado\u00adrize and trans\u00admit, it effec\u00adtive\u00adly replaces IP address\u00ades that are fas\u00adtid\u00adi\u00adous to use and impos\u00adsi\u00adble to mem\u00ado\u00adrize in num\u00adbers\u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--1 eplus-styles-uid-fc8d91\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-the-reading-of-a-domain-name\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column is-vertically-aligned-center eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-67c4ba\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer eplus-wrapper\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-large eplus-wrapper\"><img decoding=\"async\" src=\"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\" alt=\"Resources - &quot;5 minutes to understand&quot; document - Nameshield\" class=\"wp-image-4632\"><\/figure>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-d71fac\">\n<h2 class=\"eplus-wrapper wp-block-heading\">Register a domain name<\/h2>\n\n\n\n<p class=\" eplus-wrapper\">The domain name is the first link between the web user and your web\u00adsite. It is thanks to the domain name that you are found on the Inter\u00adnet, that you are vis\u00adi\u00adble, that your iden\u00adti\u00adty is dis\u00adplayed and that you devel\u00adop your busi\u00adness on the net \u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--2 eplus-styles-uid-a19437\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-register-a-domain-name\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div><\/div>\n\n<div class=\"wp-block-columns alignwide eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-2377f3\"><div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-2fb308\">\n<h2 class=\"eplus-wrapper wp-block-heading\">Operations on domain names<\/h2>\n\n\n\n<p class=\" eplus-wrapper\">A domain name is main\u00adly used to iden\u00adti\u00adfy the address of a web\u00adsite and for the e\u2011mail sys\u00adtem. Easy to iden\u00adti\u00adfy, mem\u00ado\u00adrize and trans\u00admit, it effec\u00adtive\u00adly replaces IP address\u00ades that are fas\u00adtid\u00adi\u00adous to use and impos\u00adsi\u00adble to mem\u00ado\u00adrize in num\u00adbers \u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--3 eplus-styles-uid-aa1ee5\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-operations-on-domain-names\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-d71fac\">\n<h2 class=\"eplus-wrapper wp-block-heading\">SEO of domain names<\/h2>\n\n\n\n<p class=\" eplus-wrapper\">Search Engine Opti\u00admiza\u00adtion (<em><strong>SEO<\/strong><\/em>) is a set of tech\u00adniques aimed at opti\u00admiz\u00ading the vis\u00adi\u00adbil\u00adi\u00adty of a web page in the search results. For your posi\u00adtion\u00ading in search engines and for your com\u00admu\u00adni\u00adca\u00adtion, the domain name is of sig\u00adnif\u00adi\u00adcant impor\u00adtance \u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--4 eplus-styles-uid-16cf21\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/5-minutes-to-understand\/5-minutes-to-understand-seo-of-domain-names\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-2fb308\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong>The protection of your domain names<\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\">Domain name is the first link between the web user and your web\u00adsite. It is thanks to the domain name that you are found on the Inter\u00adnet, that you are vis\u00adi\u00adble, that your iden\u00adti\u00adty is dis\u00adplayed and that you devel\u00adop your busi\u00adness on the net. It is a dig\u00adi\u00adtal asset of your busi\u00adness\u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--5 eplus-styles-uid-9ac96c\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/5-minutes-to-understand-the-protection-of-your-domain-names\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div><\/div>\n\n<div class=\"wp-block-columns alignwide eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-cac27e\"><div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-2e8e87\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong>The lifespan of a domain name<\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\">You are not, strict\u00adly speak\u00ading, the own\u00ader of a domain name, you sim\u00adply have a right to use it, which trans\u00adlates into an annu\u00adal fee that can be renewed indef\u00adi\u00adnite\u00adly or ter\u00admi\u00adnat\u00aded in case of infringe\u00adment. As soon as you no longer pay the annu\u00adal fee required to main\u00adtain it\u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--6 eplus-styles-uid-dbbd87\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-the-lifespan-of-a-domain-name\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-2fb308\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong><strong>Domain names: which procedure?<\/strong><\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\">Names\u2019 hold\u00aders must pro\u00adtect their brands and domain names against fraud and abuse just as they would pro\u00adtect any oth\u00ader valu\u00adable asset. The infringe\u00adment of your domain name weak\u00adens the strength of your brand \u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--7 eplus-styles-uid-4ece92\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-domain-names-which-procedure\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-906c13\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong><strong><strong>Data theft of a website<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\">Every day, new cyber\u00adat\u00adtacks are threat\u00aden\u00ading com\u00adpa\u00adnies\u2019 defense sys\u00adtems, and fur\u00adther weak\u00aden rela\u00adtions with web users, par\u00adtic\u00adu\u00adlar\u00adly on e\u2011commerce web\u00adsites. Iden\u00adti\u00adty theft and <em><strong>data theft<\/strong><\/em> have become com\u00admon \u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--8 eplus-styles-uid-bbf0c7\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/5-minutes-to-understand\/5-minutes-to-understand-data-theft-of-a-website\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div><\/div>\n\n<div class=\"wp-block-columns alignwide eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-84e790\"><div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-2fb308\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong><strong><strong>Abusive domain names registrations<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\">The dig\u00adi\u00adtal world is in per\u00adpet\u00adu\u00adal evo\u00adlu\u00adtion and every days, new domain names are reg\u00adis\u00adtered around the world.<br>Among these new reg\u00adis\u00adtra\u00adtions, some can poten\u00adtial\u00adly affect your noto\u00adri\u00adety, your activ\u00adi\u00adty, and your results\u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--9 eplus-styles-uid-ce2d9e\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-abusive-domain-names-registrations\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-d71fac\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong><strong>Cyberattacks \u2014 Operating Mode<\/strong><\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\">Every day, new <strong>cyber attacks<\/strong> under\u00admine the defense sys\u00adtems of com\u00adpa\u00adnies, and fur\u00adther weak\u00aden net\u00adworks, <strong>cyber\u00adat\u00adtacks <\/strong>fol\u00adlow one anoth\u00ader expo\u00adnen\u00adtial\u00adly.<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--10 eplus-styles-uid-ea7294\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-cyberattacks-operating-modes\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-2fb308\">\n<h2 class=\"eplus-wrapper wp-block-heading\">DDoS Attacks<\/h2>\n\n\n\n<p class=\" eplus-wrapper\">Every day, new <strong>cyber attacks<\/strong> under\u00admine the defense sys\u00adtems of com\u00adpa\u00adnies, and fur\u00adther weak\u00aden net\u00adworks, <strong>cyber\u00adat\u00adtacks <\/strong>fol\u00adlow one anoth\u00ader expo\u00adnen\u00adtial\u00adly<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--11 eplus-styles-uid-e9c83f\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-ddos-attack\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div><\/div>\n\n<div class=\"wp-block-columns alignwide eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-8cb201\"><div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-d71fac\">\n<h2 class=\"eplus-wrapper wp-block-heading\">SSL \/ TLS certificates<\/h2>\n\n\n\n<p class=\" eplus-wrapper\">An <strong><em>SSL <\/em><\/strong>(Secure Sock\u00adet Lay\u00ader) or TLS (Trans\u00adport Lay\u00ader Secu\u00adri\u00adty) <strong><em>cer\u00adtifi\u00adcate <\/em><\/strong>is a dig\u00adi\u00adtal cer\u00adtifi\u00adcate that authen\u00adti\u00adcates a serv\u00ader (most often a web serv\u00ader) and encrypts the data exchanged with it\u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--12 eplus-styles-uid-8bbd5a\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-ssl-tls-certificates-2\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-2fb308\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong><strong>UDRP procedure<\/strong><\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\"><strong>Estab\u00adlished on ICANN\u2019s pro\u00adpos\u00adal, the UDRP (Uni\u00adform Domain-Name Dis\u00adpute Res\u00ado\u00adlu\u00adtion Pol\u00adi\u00adcy) extra-judi\u00adcial pro\u00adce\u00addure allows to sanc\u00adtion obvi\u00adous and indis\u00adputable infringe\u00adments of a trade\u00admark right \u2026<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--13 eplus-styles-uid-41c5c2\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-udrp-procedure\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-906c13\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong><strong>Syreli procedure<\/strong><\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\">Placed under the aegis of <strong>AFNIC<\/strong>, this pro\u00adce\u00addure allows to sanc\u00adtion obvi\u00adous and indis\u00adputable infringe\u00adments of a trade\u00admarks right result\u00ading from the reg\u00adis\u00adtra\u00adtion by third par\u00adties of iden\u00adti\u00adcal or sim\u00adi\u00adlar domain names \u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--14 eplus-styles-uid-887af5\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-syreli-procedure\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div><\/div>\n\n<div class=\"wp-block-columns alignwide eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-633a7f\"><div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-2fb308\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong><strong><strong>URS procedure<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\">The <em><strong>URS<\/strong><\/em> (Uni\u00adform Rapid Sus\u00adpen\u00adsion Sys\u00adtem) pro\u00adce\u00addure is the lat\u00adest domain name dis\u00adpute res\u00ado\u00adlu\u00adtion pro\u00adce\u00addure imple\u00adment\u00aded by ICANN for new exten\u00adsions\u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--15 eplus-styles-uid-b6b402\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-urs-procedure\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-d71fac\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong><strong>DNS resolution of domain names<\/strong><\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\">Human beings have a very bad mem\u00ado\u00adry for num\u00adber sequences. How\u00adev\u00ader, com\u00adput\u00aders and servers com\u00admu\u00adni\u00adcate with each oth\u00ader by iden\u00adti\u00adfy\u00ading them\u00adselves through an IP address, which is a sequence of num\u00adbers or a mix of num\u00adbers that is very com\u00adplex to mem\u00ado\u00adrize and dif\u00adfer\u00aden\u00adti\u00adate\u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--16 eplus-styles-uid-16f0a8\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/resources\/5-minutes-to-understand-dns-resolution-of-domain-names\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-2fb308\">\n<h2 class=\"eplus-wrapper wp-block-heading\">Who manages the Internet?<\/h2>\n\n\n\n<p class=\" eplus-wrapper\"> Find out in this 5 min\u00adutes to under\u00adstand doc\u00adu\u00adment <em><strong>who man\u00adages the Inter\u00adnet<\/strong><\/em>, what are the roles of ICANN, reg\u00adistries and reg\u00adis\u00adtrars. <\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--17 eplus-styles-uid-e3b3e3\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/5-minutes-to-understand\/5-minutes-to-understand-who-manages-the-internet\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div><\/div>\n\n<div class=\"wp-block-columns alignwide eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-af560b\"><div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-d71fac\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong>Domain names extensions<\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\">The \u201cTop Lev\u00adel Domains\u201d also called TLD or exten\u00adsions, are defined by the IANA (Inter\u00adnet Assigned Num\u00adbers Author\u00adi\u00adty) which depends on ICANN since 1998\u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--18 eplus-styles-uid-3ede80\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand-domain-names-extensions\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-838762\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong><strong>DNS cache poisoning<\/strong><\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\">The DNS (Domain Name Sys\u00adtem) is a key ser\u00advice of the Inter\u00adnet. It is a giant, hier\u00adar\u00adchi\u00adcal and dis\u00adtrib\u00aduted direc\u00adto\u00adry that asso\u00adciates IP address\u00ades with domain names that are eas\u00adi\u00ader to \u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--19 eplus-styles-uid-59b5b2\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-dns-cache-poisoning\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-d71fac\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong>Monitoring solutions<\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\">A domain name is not sta\u00adt\u00adic, it evolves. It can be inac\u00adtive, asso\u00adci\u00adat\u00aded to a web\u00adsite, to a mes\u00adsag\u00ading ser\u00advice. The web\u00adsite can be oper\u00adat\u00aded, deac\u00adti\u00advat\u00aded or its con\u00adtent can change \u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--20 eplus-styles-uid-555b53\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/en\/5-minutes-to-understand\/5-minutes-to-understand-monitoring-solutions\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div><\/div>\n\n<div class=\"wp-block-columns alignwide eplus-wrapper is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex eplus-styles-uid-5d2d73\"><div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-2fb308\"><\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-d71fac\">\n<h2 class=\"eplus-wrapper wp-block-heading\"><strong><strong><strong>Phishing as a Service (PhaaS)<\/strong><\/strong><\/strong><\/h2>\n\n\n\n<p class=\" eplus-wrapper\"> It\u2019s an explod\u00ading phe\u00adnom\u00ade\u00adnon in the cyberthreat land\u00adscape and one that con\u00adtin\u00adues to get armed with tools that make it ever more pros\u00adper\u00adous\u2026<\/p>\n\n\n\n<div class=\"wp-block-buttons eplus-wrapper is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\"><div class=\"is-style-outline is-style-primary wp-block-button eplus-wrapper is-style-outline--21 eplus-styles-uid-651a23\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/5-minutes-to-understand-phishing-as-a-service-phaas\/\" style=\"border-radius:2px\">Down\u00adload<\/a><\/div><\/div>\n<\/div>\n\n<div class=\"wp-block-column eplus-wrapper is-layout-flow wp-block-column-is-layout-flow eplus-styles-uid-2fb308\"><\/div><\/div><\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity eplus-wrapper\">\n\n\n\n<p class=\" eplus-wrapper\"><a href=\"https:\/\/www.nameshield.com\/en\/glossary\/\">Glos\u00adsary<\/a><\/p>\n\n\n\n<p class=\" eplus-wrapper\"><a href=\"https:\/\/www.nameshield.com\/en\/goodies\/\">Good\u00adies<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The read\u00ading of a domain name A domain name is main\u00adly used to iden\u00adti\u00adfy the address of a web\u00adsite and for the e\u2011mail sys\u00adtem. Easy to iden\u00adti\u00adfy, mem\u00ado\u00adrize and trans\u00admit, it effec\u00adtive\u00adly replaces IP address\u00ades that are fas\u00adtid\u00adi\u00adous to use and impos\u00adsi\u00adble to mem\u00ado\u00adrize in num\u00adbers\u2026 Reg\u00adis\u00adter a domain name The domain name is the\u2026&nbsp;<a href=\"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/\" class rel=\"bookmark\">Read More \u00bb<span class=\"screen-reader-text\">5 min\u00adutes to under\u00adstand\u2026<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"wp_typography_post_enhancements_disabled":false,"editor_plus_copied_stylings":"{}","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"on","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-1079","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>&quot;5 minutes to understand&quot; documents - Nameshield<\/title>\n<meta name=\"description\" content=\"Download these &quot;5 minutes to understand&quot; documents, to understand the basics about domain names, online brand protection and cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"&quot;5 minutes to understand&quot; documents - Nameshield\" \/>\n<meta property=\"og:description\" content=\"Download these &quot;5 minutes to understand&quot; documents, to understand the basics about domain names, online brand protection and cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/\" \/>\n<meta property=\"og:site_name\" content=\"Nameshield\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-10T11:10:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/\",\"name\":\"\\\"5 minutes to understand\\\" documents - Nameshield\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\",\"datePublished\":\"2020-07-20T13:57:15+00:00\",\"dateModified\":\"2023-02-10T11:10:02+00:00\",\"description\":\"Download these \\\"5 minutes to understand\\\" documents, to understand the basics about domain names, online brand protection and cybersecurity.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/5-minutes-to-understand\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\",\"contentUrl\":\"https:\\\/\\\/nameshield.com\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/\",\"name\":\"Nameshield\",\"description\":\"Online Assets Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.nameshield.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\"5 minutes to understand\" documents - Nameshield","description":"Download these \"5 minutes to understand\" documents, to understand the basics about domain names, online brand protection and cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/","og_locale":"en_US","og_type":"article","og_title":"\"5 minutes to understand\" documents - Nameshield","og_description":"Download these \"5 minutes to understand\" documents, to understand the basics about domain names, online brand protection and cybersecurity.","og_url":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/","og_site_name":"Nameshield","article_modified_time":"2023-02-10T11:10:02+00:00","og_image":[{"url":"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/","url":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/","name":"\"5 minutes to understand\" documents - Nameshield","isPartOf":{"@id":"https:\/\/www.nameshield.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/#primaryimage"},"image":{"@id":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/#primaryimage"},"thumbnailUrl":"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png","datePublished":"2020-07-20T13:57:15+00:00","dateModified":"2023-02-10T11:10:02+00:00","description":"Download these \"5 minutes to understand\" documents, to understand the basics about domain names, online brand protection and cybersecurity.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nameshield.com\/en\/5-minutes-to-understand\/#primaryimage","url":"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png","contentUrl":"https:\/\/nameshield.com\/wp-content\/uploads\/2021\/05\/5-minutes-pour-comprendre-Taking-notes-bro-red-Storyset.png"},{"@type":"WebSite","@id":"https:\/\/www.nameshield.com\/en\/#website","url":"https:\/\/www.nameshield.com\/en\/","name":"Nameshield","description":"Online Assets Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nameshield.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/comments?post=1079"}],"version-history":[{"count":22,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1079\/revisions"}],"predecessor-version":[{"id":2320,"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/pages\/1079\/revisions\/2320"}],"wp:attachment":[{"href":"https:\/\/www.nameshield.com\/en\/wp-json\/wp\/v2\/media?parent=1079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}