Brands
3Com
Alcatel-Lucent
Allied-Telesis
Avaya
Brocade
Cisco
D-Link
Dell
Emulex
Enterasys
Extreme
Force10
Foundry
H3C
HP
Huawei
Intel
Juniper
Linksys
Marconi
McAfee
Netgear
Nortel
Planet
Qlogic
Redback
SMC
Sun
TRENDnet
Vixel
ZTE
ZyXEL

Fiber Optic Wiki

Second-level ISP

December 29, 2011

The last five years have seen the development of Second-level ISP’s. They are actually a type of anonymous internet access providers which is distinct from other anonymous browsing solutions (proxy lists, Tor, JAP). A Second-level ISP provides secure and anonymous internet access using two main technologies: SSH tunneling and Virtual Private Networks (VPN). The best ones offer both, often for the same price.

Why use a second-level ISP

December 29, 2011

Internet Service Providers in most countries now log all incoming and outgoing data, downloads and uploads, emails and files transferred, for an unlimited period of time. As of Dec.14th, 2005 the EU Parliament passed a law calling for the European Union ISP's to retain certain records for at least six months. The following data will be saved by ISP's.

General background for Second-level ISP use

December 29, 2011

As the world becomes always more inter-connected, individuals feel less resigned to accept the restrictions imposed on them by their local governments and catch the opportunity to escape these restrictions, at least concerning their online activities.

Commerce Defies Traditional Tax Jurisdictions

December 29, 2011

Using the internet, a company can, in theory, move its e-commerce business to a “tax haven” country and conduct e-commerce outside the jurisdiction of any country that would otherwise tax the transaction.

DNS hosting service

December 29, 2011

A DNS hosting service is a service that runs Domain Name System servers. Most, but not all, domain name registrars include DNS hosting service with registration. Free DNS hosting services also exist. Many third-party DNS hosting services provide Dynamic DNS.

Fast flux is a DNS technique

December 29, 2011

Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies. It can also refer to the combination of peer-to-peer networking, distributed command and control, web-based load balancing and proxy redirection used to make malware networks more resistant to discovery and counter-measures. The Storm Worm is one of the recent malware variants to make use of this technique.

Bestsellers
10GBASE-SR SFP+ 850nm 300m
SFP-10G-SR
5 out of 5 Stars! $175.00
5 out of 5 Stars!
1000BASE-SX SFP 850nm 550m
GLC-SX-MM
5 out of 5 Stars! $25.00
5 out of 5 Stars!
1000BASE-T SFP RJ45 100m
GLC-T
0 out of 5 Stars! $45.00
0 out of 5 Stars!
10GBASE-LR SFP+ 1310nm 10km
SFP-10G-LR
0 out of 5 Stars! $399.00
0 out of 5 Stars!