Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Register your own .mil Domain

CmdrTaco posted more than 11 years ago | from the someone-should-register-paper.mil dept.

Security 334

JWSmythe writes " As reported in This Story at theregister.co.uk ,and on dailyrotten.com, it seems the US Department of Defense has dropped the ball. Not only can you register a .mil domain, but you can find "secret" domains that aren't publically known (the gov't uses security through obscurity?). I'm looking forward to hacker.mil, warez.mil, and porn.mil."

Sorry! There are no comments related to the filter you selected.

fp (-1, Flamebait)

Anonymous Coward | more than 11 years ago | (#5161763)

death to all black nigger

Re:fp (0, Redundant)

gwb77 (644897) | more than 11 years ago | (#5161788)

as opposed to white negroes?

Re:fp (-1, Flamebait)

Anonymous Coward | more than 11 years ago | (#5161849)

Yes, aka "whiggers". Those are typically, if you look carefully, really ugly caucasian people that somehow have to dress up "whigger" style in order to be accepted.

Let's not even get into "chiggers" (chinese niggers), which sadly enough, is becoming a norm. Yes, I'm chinese and seeing this makes me sick.

Re:fp (0)

m1chael (636773) | more than 11 years ago | (#5161909)

dawg geh wif da ploglam, gee.

Re:fp (-1, Troll)

Anonymous Coward | more than 11 years ago | (#5161831)

what about those turd colored middle-easterners?

Haha (-1, Offtopic)

Anonymous Coward | more than 11 years ago | (#5161765)

And then I can run MySQL and infect the Internet!! Crazy Linux hippies, if they used real commercial products, yesterday wouldn't have happened.

Re:Haha (-1, Troll)

Anonymous Coward | more than 11 years ago | (#5161840)

that's MS Sql lameass, which is a Microsoft Product created by chimpanzees

sp (5, Funny)

Anonymous Coward | more than 11 years ago | (#5161768)

goatse.mil?

Of course... (0, Redundant)

sielwolf (246764) | more than 11 years ago | (#5161775)

Dailyrotten.com just points to theRegister.co.uk article. It's like saying "Hey! I found more information here! [slashdot.org] "

Re:Of course... (0)

Anonymous Coward | more than 11 years ago | (#5161983)

Well, that's the essence of slashdot, is it not?

Hmm.... (3, Funny)

LinuxCumShot (582742) | more than 11 years ago | (#5161780)

I wonder if Osama has Al-Queda.mil?

Re:Hmm.... (5, Interesting)

Anonymous Coward | more than 11 years ago | (#5161995)

Dunno but you can do it for him:

nic.mil/cgi-bin/domain [nic.mil]

what about... (5, Funny)

DarklordSatin (592675) | more than 11 years ago | (#5161782)

runofthe.mil

General.mil (5, Funny)

CheeseburgerBlue (553720) | more than 11 years ago | (#5161795)

Mmmm....cereal.

Cara.mil (2, Funny)

handsomepete (561396) | more than 11 years ago | (#5161806)

Mmmm... caramel.

Perfect... (5, Funny)

SoSueMe (263478) | more than 11 years ago | (#5161874)

Perfect for SlashDot... "Rumor.mil"

Re:what about... (2, Funny)

RumpRoast (635348) | more than 11 years ago | (#5161860)

rastafarian.mil

Re:what about... (2, Interesting)

Blimey85 (609949) | more than 11 years ago | (#5161862)

Mod this fucker up!!!

That's the funniest shit so far today.

The peace.mil was also pretty good.

I'm wondering how with all the billions of dollars we spend on military shit, how the military can constanly screw things up... BTW, was .mil supposed to only be US mil or could any military anywhere get a .mil domain? And what kind of proof did you have to show to prove you were a military organization?

Peace? (5, Funny)

Vigilante42 (613796) | more than 11 years ago | (#5161783)

peace.mil

... hacker.mil, warez.mil, and porn.mil (0)

Anonymous Coward | more than 11 years ago | (#5161784)

So are the service men.

hard to believe (1, Interesting)

Anonymous Coward | more than 11 years ago | (#5161786)

I work for the Air Force and I really find this hard to believe -they are very careful with their networks, almost to the point of making working there very difficult!

Re:hard to believe (2, Informative)

thac0 (644918) | more than 11 years ago | (#5161850)

Maybe the air force does make it difficult. I've certainly seen some pretty tight networks myself, but that doesn't mean that everything is. And the subject in question is actually kind of a fringe subject that one might believe to be missed in security sweeps and such.

Re:hard to believe (-1, Flamebait)

Anonymous Coward | more than 11 years ago | (#5161893)

doing what? sucking off generals?

get em while they're hot (1, Funny)

trb (8509) | more than 11 years ago | (#5161789)

hmmm. diploma.mil? gin.min?

Re:get em while they're hot (0)

Anonymous Coward | more than 11 years ago | (#5161896)

in the same vein... pointlessdeath.mil

What was that about homelnd security? (1, Interesting)

Anonymous Butthead (523905) | more than 11 years ago | (#5161791)

what was that about homeland security? I guess it's all a load...

Finally! (0)

Anonymous Coward | more than 11 years ago | (#5161793)

All my boxes is under the *.govnet.mil domain on my local DNS, *gotta* get that domain :-)

2600 contest? (4, Interesting)

capnjack41 (560306) | more than 11 years ago | (#5161794)

Doesn't (didn't) 2600 have a contest like this? The first person to manage to get a .mil domain gets a free subscription, or something like that?

Re:2600 contest? (2, Informative)

neurostar (578917) | more than 11 years ago | (#5161980)

Doesn't (didn't) 2600 have a contest like this? The first person to manage to get a .mil domain gets a free subscription, or something like that?

Their contest says that if you resgister 2600.mil (or any 2600.something) and point it to their website, you get a free lifetime subscription. (I think it's any TLD)

neurostar

Re:2600 contest? (4, Informative)

weave (48069) | more than 11 years ago | (#5161989)

2600 would be all into finding out how to do it and telling the world about it, but not going ahead and actually doing it. I've never seen them advocate breaking into systems, just how in can be done. If you read the letters to the editor in the mag and their responses to people who want to do malicious cracking, you'll see they stomp em pretty hard for being stupid.

Besides that, the military might have an incompetent admin that exposes something stupid like that, but I for one wouldn't want to try my luck at exploiting it. I think you'd face better odds for survival as a black man spitting on an LAPD officer in a remote area away from public view.

Link to .mil Registry (5, Informative)

Motherfucking Shit (636021) | more than 11 years ago | (#5161803)

http://www.nic.mil/dodnic [nic.mil] . No, I didn't go poking around. If you've got bigger balls than I, perhaps you can link to the supposed admin area...

Re:Link to .mil Registry (1)

SoSueMe (263478) | more than 11 years ago | (#5161988)

Big balls or not, if you go poking around, you will probably find a ".mil/stone_around/your-neck"

Place your bets...... (1)

MullerMn (526350) | more than 11 years ago | (#5161809)

From The Register: We are, of course, straining against every natural, journalistic impulse in our beings by neglecting to mention any useful search strings with which to find it.

How long will it be before some A/C posts them here?

41 minutes... (1)

turbosaab (526476) | more than 11 years ago | (#5161867)

... is my bet on how long it will take for someone to post the link. Anyone want to bet how much jail time they'll get?

Re:41 minutes... (2, Insightful)

Anonymous Coward | more than 11 years ago | (#5161986)

For posting directions to a publicly available, unprotected resource?

None whatsoever of course!

Re:41 minutes... (2, Funny)

kasperd (592156) | more than 11 years ago | (#5162008)

Anyone want to bet how much jail time they'll get?

Anyone want to bet whether the military can find the offender? Oh, they can probably find which country it was done from. Does anybody want to call the responsible person a terrorist and start a war against the country?

How long before the DMCA kicks in (0)

Anonymous Coward | more than 11 years ago | (#5161876)

methinks the link is down.... i think they oulled it from there immediately...

google showed up with it, didn't mess around though
i wonder what POC stands for?

POC = Point of Contact (0)

Anonymous Coward | more than 11 years ago | (#5161891)

POC = Point of Contact

Re:How long before the DMCA kicks in (0)

Anonymous Coward | more than 11 years ago | (#5161975)

POC = Piece of Crap

Nothing to see here (4, Funny)

isorox (205688) | more than 11 years ago | (#5161811)

This is a runofthe.mil story

The Register story is two days old. (5, Insightful)

More Karma Than God (643953) | more than 11 years ago | (#5161814)

Why is this just hitting Slashdot now?

As far as I know The Register broke the story, and nobody else has cited information that wasn't in The Register's article.

Does anyone have a screenshot of this site?

Re:The Register story is two days old. (1)

girl_geek_antinomy (626942) | more than 11 years ago | (#5162031)

Yeah, I submitted this story Friday evening GMT, just after it hit The Register. My guess is Slashdot was checking their legal responsibilites (and cta) etc... being a good 'Merkin site, and all that...

And yeah, I'm a bit peeved I didn't get the credit...

honeypot? (1)

masteroveride (459247) | more than 11 years ago | (#5161816)

I strongly doubt that the DoD would give the IP addresses of machines with sensitive data on the web without them knowing about it. Then again if they don't, what does that mean about them fighting a war in Iraq?!?

Impressive? (3, Funny)

hafree (307412) | more than 11 years ago | (#5161819)

Pretty cool... First person to get a .va (Vatican City State) domain gets my vote though.

I pitty the poor idiot who actually uses that ! (3, Insightful)

red-beard's (639520) | more than 11 years ago | (#5161824)

Whoever is stupid enough to screw with the DOD is on their own . I remeber the letter of the cyber terrorism bill all too clearly . They'll be bustin down your front door and haulin you away like you are illian(sp?) gonzales on crack . Oh an mind you once they have you your rights are revoked as you are a terrorist . Boy after this incident I'll be watching as i drive through washington dc for a line of the idiots heads who tried out this vulnerability on pikes per Rumsfields orders .This is a bad time to be poking at americas security . Kinda like throwing rocks at a rabid junkyard dog while sittin in his dog house .

In a related story... (4, Funny)

NOT-2-QUICK (114909) | more than 11 years ago | (#5161826)

The secret government TLD .bush was recently discover by a small group of drunken frat boys while searching for new free prOn sites...

Early reports indicated that Jenna was involved, but this has to be corroborated! :-)

n2q

Re:In a related story... (2, Funny)

JohnFluxx (413620) | more than 11 years ago | (#5161866)

I was searching for porn, "bush" wouldn't be the first word to pop into my head..

Re:In a related story... (0)

Anonymous Coward | more than 11 years ago | (#5161992)

dick? penis? scrotum? lick my balls? oh yeah that feels good?

Re:In a related story... (4, Funny)

kasperd (592156) | more than 11 years ago | (#5162027)

I was searching for porn, "bush" wouldn't be the first word to pop into my head..

Clinton?

Re:In a related story... (1)

SoSueMe (263478) | more than 11 years ago | (#5162028)

There's a difference between "pornographic" and "obscene".

ya, but is it worth the risk? (2, Insightful)

LinuxPunk (641305) | more than 11 years ago | (#5161830)

Unless your good at covering your tracks, and use lotsa proxy servers in the process, is it really worth the risk of going to jail for 5+ years for unauthorized use of a military computer system to register a domain name??

BTW, this story is old, i read it yesterday. :P, and yes i do know the URL for registering these domains, even though it doesnt say in the article.

Your Government At Work (2, Interesting)

GabrielF (636907) | more than 11 years ago | (#5161845)

IIRC a few years ago the Chinese were caught buying up surplus military equipment including replacement parts for Apache helicopters and hard drives containing sensitive nuclear data. Admittedly with such a huge organization carelessness is to be expected, especially since these guys are overworked and underpaid, but I do wish that the government would stop encouraging average americans to be paranoid when they constantly drop the ball themselves.

I'd like to see... (4, Funny)

Sentry21 (8183) | more than 11 years ago | (#5161852)

Perhaps this story would be best posted at the rumour.mil?

Come on, that was funny!

Oh well..

--Dan

How long before Google is sued? (5, Interesting)

jdreed1024 (443938) | more than 11 years ago | (#5161855)

For those who didn't RTFA, one of the points of the article is not only are there unprotected admin interfaces that let you register your own domain (that's what they're talking about - you still can't register .mil through register.com or anything), add a user, and view traffic stats on DoD sites (even "hidden" ones), but that all these pages (including default passwords) are cached by Google.

This implies that even if the DoD fixes the problem, the Google caches will still be available (until they expire or are replaced). Now, in the past, we've heard reports of people being upset that Google cached information. However, this time, the cache contains information pertaining to "national security" (that great new buzzword). I wonder, what will happen? Will these URLs be silently deleted from the cache? Will Google be told that cacheing links is now illegal because it could aid terrorists? Will they be prevented from cacheing .gov and .mil? Will Google be sued out of existence?

We've all found Google caches to be useful, when, say the documentation for an open source project is hosted via 56K modem line in the Czech Republic, for example, or even when a site is Slashdotted, but it'll be interesting to see what happens about this, and how the goverment may over-react.

(Note, if you're too stupid to understand this, I'm not talking about blame here - don't bother saying "Google rulez, the militery is dum asses for leeving these sitez open, u r an idiot...". I'm talking about reprocussions. Certainly Google doesn't "know" what information a link contains when they cache it. Certainly it's the government's fault for leaving open admin pages with default passwords listed on the page. But just because someone isn't at fault, doesn't mean they can't get screwed over.)

Re:How long before Google is sued? (2, Informative)

vericgar (627150) | more than 11 years ago | (#5161879)

http://www.google.com/webmasters/3.html#B2 Google has in place functionality to not cache a page, and has had this for a long time. The fault here is with the DoD. They need to learn some security.

Re:How long before Google is sued? (0)

Anonymous Coward | more than 11 years ago | (#5161967)

Google has dropped cached versions of .mil before without a lawsuit- since Oct 01 at least.

The good part of the DMCA will save them (1)

Jerf (17166) | more than 11 years ago | (#5161974)

The DMCA partially protects Google in their caching. I say "partially" because a close reading of the bill shows that it is debatable whether or not they qualify for the caching provisions, but after a while they should have a certain amount of de facto protection, I would hope.

In addition to their compliance with the DMCA notification, they also provide a help page and automated removal system [google.com] for the desparate. (See the last section of the page for the DMCA notification instructions, which involve physical letters and legal affirmation of ownership.)

Note that this is the "good" provision of the DMCA, preventing people from being liable for content they merely cache, not actively provide.

Since in this country the military isn't above the law, they'd still have a hard time finding something illegal that Google did. They don't have the luxury of simply not liking someone, like in some countries. If they don't want to be cached, the law says it is their obligation to opt-out, not Google's.

Aaahh (5, Informative)

Anonymous Coward | more than 11 years ago | (#5161859)

I found this [nic.mil] without having to click on this [nic.mil]

Re:Aaahh (5, Informative)

Anonymous Coward | more than 11 years ago | (#5161901)

And this [nic.mil] is the domain registration link.

Won't work without a .mil email address, though.

Re:Aaahh (0)

Anonymous Coward | more than 11 years ago | (#5161932)

say, does slashdot log a/c ips?

Re:Aaahh (0)

Anonymous Coward | more than 11 years ago | (#5161947)

yep they just transmitted YOURS to bush himself.

Re:Aaahh (2)

root(at)jdm (631269) | more than 11 years ago | (#5162029)

It works just fine without a .mil address. At the end of the registration process it has a check box you can check if you don't have a working .mil address. 6-B: If you do not have a working e-mail address (due to various network problems, or because its creation depends on this registration), you may indicate so by toggling the checkbox below.

Re:Aaahh (1)

afree87 (102803) | more than 11 years ago | (#5162056)

OK, who wants to rev up the Anonymizer and register peace.mil? :)

/. effect (0)

Anonymous Coward | more than 11 years ago | (#5161911)

I wonder when it will be /.'ed.

Re:Aaahh (5, Informative)

Anonymous Coward | more than 11 years ago | (#5161924)

This [nic.mil] too, for reserving your very own netblock.

Re:Aaahh (4, Informative)

Big Mark (575945) | more than 11 years ago | (#5161928)

From the ftp link they gave. You need this info to register:
H2B. Sponsoring Agency..........:

Indicate the Service, Unified or Specified Command, DoD operating
Agency, or non-DoD Agency of the US government that you are affiliated
with. (for a valid list of agencies, please refer to the
service-agencies.txt located in the netinfo directory).

Example: AF
Ah. So you can't get one if you're not a serviceman. No story, methinks.

-Mark

Re:Aaahh (0)

Anonymous Coward | more than 11 years ago | (#5161978)

Isn't this supposed to be in Google's cache? I tried finding it a few hours before it was posted on /. and got nothing in addition to checking right now. They must have removed it.

Re:Aaahh (5, Informative)

xintegerx (557455) | more than 11 years ago | (#5161984)

Wow, I didn't believe it was there!

I found references to http://www.nic.mil/cgi-bin/whois on google. I was debating on trying /admin and etc instead, but didn't :)

Instead, I searched for

admin http://www.nic.mil

on Google, to verify the news. I ended up clicking on a web site that shows beginning web masters useful resources.

From there, I went to the site one level above, and from there clicked a link to view a document about standard run of the mill no big whoop procedures about webmastering (pretty useful if you want to be a contractor or write software and have it comply, I assume.)

BTW the security notice on this document is a link to army.mil's privacy policy, which says:

Information presented on Army Home Page is considered public information and may be distributed or copied unless otherwise specified. Use of appropriate byline/photo/image credits is requested.

Anyway, on this document I was just describing, click the second link to the defenselink webmasters area.

There (which is also public according to their stated policy) you can click on "Domain Registration in the .mil domain" and see this
http://www.nic.mil/ftp/mgt/bul-9605.txt [nic.mil]

These are just public info resources. army.mil's security policy says if you try to upload or change stuff, that's what they care about.

Re:Aaahh (2, Insightful)

skermit (451840) | more than 11 years ago | (#5161998)

HO-LY CRAP

"Delete an existing host"???

Some 14-year-old is going to get arrested for taking down af.mil, army.mil, navy.mil, ad nauseum ad infinitum...

Geez. Shouldn't Homeland Security be bitchslapping our own agencies around as well as chasing bad guys?

clever (3, Funny)

Anonymous Coward | more than 11 years ago | (#5161868)

allyourbase.mil

??

But, but.. the RFC says... (1)

Ndr_Amigo (533266) | more than 11 years ago | (#5161872)

This depends on whether they follow the .mil registration RFC (1956) [faqs.org] - if not, then that's what you get for violating RFCs! Just having access to an admin interface does not imply it's automatic. All registrations should still have to be accepted by the hostmaster first. As the RFC says, security implications are not discussed :)

here it is... (5, Informative)

Anonymous Coward | more than 11 years ago | (#5161883)

link [disa.mil]

Re:here it is... (2, Interesting)

Anonymous Coward | more than 11 years ago | (#5161904)

From the site, before it gets taken down...
Please complete the information below then click the SUBMIT button to send this request to the proper office. If you are not a DOD Employee you must complete the Non-DOD Employee section. If you are requesting access other than QUERY ONLY you must notify your Contracting Officer or Government Sponsor so they can obtain and send verification of access level authorized by the appropriate Functional Data Administrator or Component Data Administrator to the Help Desk. Once received by the DDDS Help Desk your request will be processed and you will be sent via Email, Telephone or mail a USERID which you will use to logon to the DDDS. The first time you logon you will be required to enter a password.


If you do not receive your userid within a few days please contact the DDDS Help Desk. We have been experiencing problems that we do not always get the online submissions. You may be requested to please print this request form and fax it to the Help Desk for processing.

Also, please be sure that if you fill and print this page that the printout is legible. Many applications that are faxed can not be read thus slowing the process of getting an id.
Karma Whoring is gay, that's why this is A/C. Plus I'm outside the US, they can't touch me. Oh waitasec...

And from that... (0)

Anonymous Coward | more than 11 years ago | (#5161925)

Wow, you've just made it incredibly easy to find the google cache....

Are you sure that's the right one? (0)

Anonymous Coward | more than 11 years ago | (#5161933)

I checked the google cache, and it doesn't say on that page, anywhere, what the password is.

Re:here it is... (0)

Anonymous Coward | more than 11 years ago | (#5162033)

gay is a good thing. so karma whoring is good? afaik, karma whoring is BAD...

A superbly awesome idea (0)

Anonymous Coward | more than 11 years ago | (#5161889)

IN-SOVIET-RUSSIA-we-practice-better-internet-secur ity-than-lazy-capitalist-pigs.mil

Re:A superbly awesome idea (2, Funny)

KDan (90353) | more than 11 years ago | (#5162030)

Or rather...

in.soviet.russia.mil.registers.you.mil

Daniel

How to bring down... (4, Funny)

Big Mark (575945) | more than 11 years ago | (#5161890)

... the U.S. Government's DNS servers:

1) Register slashdot.mil
2)Point /. to there
3)BANG!

-Mark

interesting (1)

linuxislandsucks (461335) | more than 11 years ago | (#5161894)

slashdot.mil
kevinmitnick.mil
2600.mil
fuckedco mpany.mil
bushisanidiot.mil
ashcroftisan ass.mil

This just in (2, Funny)

DoctorFrog (556179) | more than 11 years ago | (#5161915)

The Department of Homeland Security will now be starting a file on anyone who uses Google.

DARPA will be settting up a special project to coordinate the information. In keeping with its hiring policies the Bush administartion will give the post to a senior military official from a prior administration.

Oh wait...

Here is the access list (5, Informative)

Anonymous Coward | more than 11 years ago | (#5161943)

http://www.nic.mil/visitors.txt and http://www.nic.mil/help

Gives new meaning to... (2, Insightful)

madgeorge (632496) | more than 11 years ago | (#5161944)

Total Information Awareness, now doesn't it?

-madgeorge

I'm not so sure about this. (1, Insightful)

Eideteker (641508) | more than 11 years ago | (#5161951)

Do you think it could be a trap? Given the gov't's of-late interest in total information, they just got a whole list of names for their file.

Want more info...try RFC 1956... (1)

NOT-2-QUICK (114909) | more than 11 years ago | (#5161952)

At least the DOD has been kind enough to post best practices for registering your new .mil domain name through the use of a standard format...

For more info, help yourself to RFC 1956 [faqs.org]

n2q

hmm (2, Interesting)

rask22 (144831) | more than 11 years ago | (#5161962)

I also found this [nic.mil]

Oh great (5, Funny)

LordDartan (8373) | more than 11 years ago | (#5161968)

Now with all the linking on slashdot to .mil sites, I can see the military thinking it's a huge DDOS terrorist attack!

Now repeat after me...I will not slashdot military websites...:)

ooo ooo! (1)

zephc (225327) | more than 11 years ago | (#5161969)

i waana get SGC.mil!

(Yes, I'm a Stargate fan.)

Great, piss off the DOD (1)

nurb432 (527695) | more than 11 years ago | (#5161972)

Then have their agents visit you at your house tomorrow, and haul you away under the patriot act..

Not my idea of a fun weekend, trying to explain to a guy with an M16 why he shouldn't shoot me.

Technically anyone that even reports the mistake to the *public* is potentially violating it. And irresponsible in this case, we aren't talking about some cutesy harmless web defacing, this is the US government defense department.. Morons.

Works for me (0)

Anonymous Coward | more than 11 years ago | (#5161987)

The subject says it. Even though outside of US (outside of US-jurisdiction is factually impossible these days !), I stopped voluntarily registering bull.shit.mil. To my greatest surprise, it permitted my actions until it got too hot for me. Either a honeypot, spam or incompetence ** 72! Better posted as AC, here !

Whoever creating the registration app was an MCSE (1)

Hero Zzyzzx (525153) | more than 11 years ago | (#5162002)

And creating it was part of his exam.

That's my guess, anyway. My feeling is that most *nix folks COULDN'T create anything than insecure intentionally, ever fibers of our being would scream in complaint.

Well I tried but all these were already taken... (0)

barnaclebarnes (85340) | more than 11 years ago | (#5162013)

weoverthrewiran.mil
weoverthrewguatemala.mil
weassinatevietnamese.mil
wekillciviliansinasia.mil
wesupportcoupinchile.mi
wesupportmilitartyinemsavabor.mil
wetrainedosama.mil
wesupportcontras.mil
wegavesaddammoney.mil
wegaveiraqweapons.mil
weoverthrewpanama.mil
webombaspirinfactories.mil

List of stupid american military actions [bowlingforcolumbine.com]

Perfect for........ (1)

failedlogic (627314) | more than 11 years ago | (#5162018)

The arms dealers who didn't want to advertise much before. Now they can claim to be a department of the US military.

Now that whitehouse.com is a porn site, will pentagon.mil, cia.mil and nsa.mil become porn sites as well?

spanish .mil meanings (0)

Anonymous Coward | more than 11 years ago | (#5162020)

The funny thing is that in Spanish "mil" means "one thousand". I can imagine new domains like:

"noches.mil" (Thousand nigths)
"dos.mil" (Two thousand)

It can be like he .tv domains

to late... (1)

the_mind_ (157933) | more than 11 years ago | (#5162038)

i was going to register blackop.mil but it was already taken...

Could the author be mistaken? (0)

Anonymous Coward | more than 11 years ago | (#5162044)

According to this [freerepublic.com] , perhaps.

For fresh ground pepper... (1)

Vidiot3k (612026) | more than 11 years ago | (#5162045)

go to pepper.mil ... Spicy!

where's kevin (0)

Anonymous Coward | more than 11 years ago | (#5162047)

hmmm. where's kevin?

This one probably been said already (0)

Anonymous Coward | more than 11 years ago | (#5162049)

but I couldn't bother to read all reply heh....anyway I wonder if anyone will register paper.mil?

Interface doesn't change the WHOIS database (0)

Anonymous Coward | more than 11 years ago | (#5162060)

The interface is basically a data gathering and formatting tool. Below is the result of a long session of entering data. Excerpt:
This online program makes no changes to the WHOIS database.

Result:

Return E-mail Address

The entries in your registration appear to be satisfactory. In order for the NIC/SSC to act on your registration, you must enter an e-mail address. This web program will attempt to send the template to the e-mail address you enter in line 6-A. Obviously, the template will not be delivered if you enter an incorrect e-mail address, so take extra care to enter the e-mail address correctly.

If for some reason, you are completely unable to get the template to your e-mail address, you may toggle the checkbox in line 6-B. Doing so will summon a plain-text version of your template. Save the page as plain text, and you will be able to mail the template at your leisure. You could also cut and paste the template into a separate window.

PAY ATTENTION!
This online program makes no changes to the WHOIS database.

The scope of this online program is to send the template to the e-mail address entered in the field below.

Once you receive the completed template, you must forward it to the appropriate point of contact for action.

The NIC will not process any templates until it receives this template (by email) from the domain administrator or service PMO.

6-A: Enter an email address that you can reach from anywhere on the NIPRNET. e.g. username@email.host.mil
6-B: If you do not have a working e-mail address (due to various network problems, or because its creation depends on this registration), you may indicate so by toggling the checkbox below.

( Anonymizer.com is (hopefully) your friend... )
( ..and a proxy to that :-)
Load More Comments
Slashdot Login

Need an Account?

Forgot your password?