Forgot your password?
typodupeerror

Comment Re:Some Obvious Questions... (Score 1) 212

Most of these questions could be answered by just taking a look at the page, but I'll indulge you.

Q: Are you allowed to run a server?
A: Yes, they do. The ISP provides for corporate business as well as home, so I think they would.

Q: Static IP or DHCP
A: Static, as the docs say. Even more than one, if I read their business offers correctly.

Q: Payload cap?
A: Beats me. Ask them?

Q: Hops to backbone:
A: A reverse traceroute to their service revealed them one hop away from sprintlink... (Three to bb3.ana.)

Q: Upstream connection and bandwidth
A: The system operates through the use of high spectrum, two way radio ("microwave"). In ideal condition, you get upstream=downstream. However, this all depends on a few facts I've not found yet; whether they use transponder sharing, and whether they do any form of compression ahead of transmission.

I'll take this oppourtunity to tell a few bits more about the technology.
Pros:
No need for Line-of-Sight
Lower cost than a permanant T1/*DSL
Good stability and reliability.
Good encryption (Read below)

Cons:
Can become "Under the weather"
Fills the airwaves even more!
Somewhat high-priced installation

Later questions pertain to whether this antenna mars the eye when installed. I'd say not, it's no bigger than a sattelite dish.

Q(s): Local servers? Spam? Content policy? Copyright accusations? (!!)
A: These are questions you should ask them if you are seriously considering using their services.
As for the "Copyright accusations", what have you to fear if you don't infringe?
But rest easy, I doubt they monitor every single line 24 hours a day for warez, so go ahead and pirate all you want. Someone will get you sooner or later. :)

Q: Do they require Windoze?
A: No. They even support UNI*/Mac when they install the hardware.



Now, about encryption.
I don't know how far back you all can remember, but not long ago a 64Bit RC4 key was cracked by what is known as Distributed Computing. You ask then "How can this be secure?"
Well, they used the collective computing force of thousands of computers spread around the world. It took them several weeks.
So, if someone wants to brute force crack the communications, they'd better have a big mojo computer. And hope that the ISP leaves the same key in for at least a month...

Hope this answers a few of your questions.

Slashdot Top Deals

A method of solution is perfect if we can forsee from the start, and even prove, that following that method we shall attain our aim. -- Leibnitz

Working...