This document discusses security best practices for host naming and URL conventions. It begins with background on how poorly planned naming conventions can unintentionally aid attackers. It then examines threats like phishing, cross-site scripting, and SQL injection that can exploit naming issues. The document recommends practices like using consistent top-level domains, simple URL paths, and monitoring domain registrations to strengthen security.