Skip to Content

Posts under tag: Internet

November 9, 2015

ISP created by a network of neighbors

The network for the Doe Bay Internet Users Association (DBIUA) of Orcas Island, WA. They utilize a microwave link with the mainland and are a completely wireless network.

The network for the Doe Bay Internet Users Association (DBIUA) of Orcas Island, WA. They utilize a microwave link with the mainland and are a completely wireless network. (Photo from DBIUA via article) reported recently about Doe Bay, a small community on Orcas Island, Washington, created their own Internet Service Provider (ISP). The network is all wireless and is dependent upon a microwave receiver link –perched atop their community water tower — with the mainland. Each of the subscribers has their own radio antenna that connects them either directly to another antenna (as a relay) or to the water tower antenna.

The need for this service arose when the CenturyLink DSL became regularly inconsistent. The 1.5 Mbps download speeds would only make it to about 700 kbps — and depending upon network demand almost non-existent.

The community pooled together their resources to purchase the microwave receiver from StarTouch Broadband Services, a local/regional backhaul microwave IP transport company. The Doe Bay Internet Users Association (DBIUA) was then able to build their radio antenna network by utilizing small drones to assist in finding the best locations for antennae, then installing them by tacking them onto tall trees instead of building control towers saving them a great deal of money.

Similar projects exist in serving smaller communities outside San Diego, CA, New York, Germany, Norway, Austria, Greece, and Spain.

For more information about this project, check out this article and supplemental video from

February 26, 2015

Update on the FCC’s Net Neutrality push

FCC logo reported that in a 3-2 vote the FCC will bring broadband internet under utility-style rules. This means internet service providers can no longer push for data “fast-lanes” or give certain data sources preferential bandwidth. The key piece of the new regulation is centered around the Title II telecommunications regulations in the 1934 Communications Act. Having the Internet classified as such will give the FCC the ability to enforce the fairness provision. The push for Net Neutrality is not over yet however–once the new rules are published within the Federal Register, it is expected that some of the larger telecom companies, like AT&T, will sue due to the increased regulation on their offerings.

For more information, check out this article from

CNET also has an article timeline of the events on this issue that can be found here.

February 4, 2015

Net Neutrality: Internet as an utility

FCC logo

FCC Chairman, Tom Wheeler, wrote a guest article on regarding net neutrality and his push for having the Internet as an utility. Below is an excerpt from his statement.

After more than a decade of debate and a record-setting proceeding that attracted nearly 4 million public comments, the time to settle the Net Neutrality question has arrived. This week, I will circulate to the members of the Federal Communications Commission (FCC) proposed new rules to preserve the internet as an open platform for innovation and free expression. This proposal is rooted in long-standing regulatory principles, marketplace experience, and public input received over the last several months.

Broadband network operators have an understandable motivation to manage their network to maximize their business interests. But their actions may not always be optimal for network users. The Congress gave the FCC broad authority to update its rules to reflect changes in technology and marketplace behavior in a way that protects consumers. Over the years, the Commission has used this authority to the public’s great benefit.

For more, check out the rest of this article at

October 8, 2012

Announcing eduroam: WiFi for travelers and guests

Eduroam flags

Information Services is excited to announce that eduroam is now available at the University of Oregon.

eduroam is a secure, worldwide WiFi roaming service that gives students, faculty, and staff WiFi access when visiting participating institutions. You and your customers can log in to the eduroam WiFi network with your Duck ID at more than 6,200 institutions worldwide, and people visiting UO can log in to eduroam WiFi here with their own credentials. No guest accounts are necessary!*

For more about eduroam at UO, see About the eduroam Wireless Network.

Using eduroam will require that you set up your phone, tablet, or laptop; the process is similar to setting up UO Secure. For step-by-step directions, see Connecting to the eduroam Network.


March 25, 2010

GoDaddy Stops Selling Chinese Domains Over Censorship Concerns

Wired writes:
GoDaddy, the net’s largest domain-name registrar, announced Wednesday it would stop selling .cn domain names, saying it was unwilling to comply with new rules from the Chinese government that require new and existing .cn domain-name holders to provide photo ID.

The announcement comes just two days after Google redirected its censored search engine to its uncensored service in Hong Kong, after a dramatic statement in January that it was no longer willing to run a censored search engine. (more…)

March 17, 2010

FCC Broadband Plan Faces Challenges

The Federal Communications Commission’s published and sent to Congress National Broadband Plan.

The document can be found on



March 15, 2010

Microsoft offers ’fix-it’ workaround for IE zero-day

About the new Microsoft «fix-it» on ZD Net:

Microsoft has released a one-click «fix-it» workaround to help Web surfers block malware attacks against an unpatched vulnerability in its flagship Internet Explorer browser.

The workaround ffectively disables peer factory in the iepeers.dll binary in affected versions of Internet Explorer.

The workaround, available here, comes on the heels of the public release of exploit code into the freely available Metasploit pen-testing framework.

March 13, 2010

«Enemies of the Internet»: Saudi Arabia, China, North Korea, Cuba… Turkey and Russia «Under Surveillance»

Annual list “The Enemies of the Internet 2010” released by Reporters Without Borders.

Ads of the World

The Enemies of the Internet 2010
The “Enemies of the Internet” list drawn up again this year by Reporters Without Borders presents the worst violators of freedom of expression on the Net: Saudi Arabia, Burma, China, North Korea, Cuba, Egypt, Iran, Uzbekistan, Syria, Tunisia, Turkmenistan, and Vietnam.

Some of these countries are determined to use any means necessary to prevent their citizens from having access to the Internet: Burma, North Korea, Cuba, and Turkmenistan – countries in which technical and financial obstacles are coupled with harsh crackdowns and the existence of a very limited Intranet. (more…)

March 10, 2010

Hackers target freshly uncovered Internet Explorer hole


SAN FRANCISCO (AFP) – Microsoft on Tuesday warned that hackers are targeting a freshly-uncovered weakness in some earlier versions of its Internet Explorer (IE) Web browser software.

Microsoft said it is investigating a hole that cyber attackers are taking advantage of in IE 6 and IE 7.

“At this time, we are aware of targeted attacks attempting to use this vulnerability,” Microsoft said in an advisory posted along with a routine release of patches for Windows and Office software. (more…)

February 24, 2010

Report outlines IPv6 security challenges

Interesting report on Government Computer News about IPv6 security:

NIST document identifies deployment risks
Ready or not, the next generation of Internet Protocols is likely to be making their appearance on government networks in the not-too-distant future, and the National Institute of Standards and Technology is advising network engineers and administrators to familiarize themselves with the security challenges of IPv6.

“The migration to IPv6 services is inevitable as the IPv4 address space is almost exhausted,” a new NIST draft publication states. “IPv6 is not backwards-compatible with IPv4, which means organizations will have to change their network infrastructure and systems to deploy IPv6.” (more…)