Ali.as

Ali.as Blog

tigerVPN

1. No way! We constructed after an ip address package’s transmission was finished efficiently tigerVPN to clear all data. Its impossible to track any client back. In addition we made a decision to use IPs that are shared anonymize and so that you can help randomize our clients. The mixture of getting several clients per ip address and certainly no logs whatsoever, wipes our clients footprint that is electronic

2. We’re a limited-liability organization. Slovakia also support ISP’s to shield their clients secrecy online and does have no information maintenance applications. We’re not needed to reveal any info with third party therefore it will not be legal as a result of telephony secrecy’s regulation.

3. Because we do not maintain logs, contemptuous behaviour, that will be the cost for assembling a client environment that is risk-free can’t be monitored by us!

4. We can not honor since clients can’t be identified by us, so it is useless to follow any petitions. We’ve got a certain file for all these e-mails 😉

5. Sam-e as previously. We significantly can not tell which client did what, when, where, at any time that is given.

6. It is allowed on all hosts even though we gradually ask our clients to make use of both Holland or Romania. Filesharing is not wanted by some infrastructure companies so that it occurred that people were requested to transfer our machines as a result of filesharing. We discovered Netherlands therefore we kindly request our clients to utilize these host parks, which take p2p and some trustworthy associates.

7. Clients will pay with Mastercard, Visa and money. In addition paypal.com is also used by us. We utilize tokens and hash keys to recognize a payment but it is not recorded or associated with the client. We needed to do that anyhow therefore we’re a PCI Level 1 certified retailer. So we will not be permitted to save any transaction or card data using our customers’ records. These tips are unnecessary for other people therefore there’s no-chance to establish an association.

8. We provide L2TP, PPTP and OpenVPN, while with algorithm and the very best security comes away of character OpenVPN. OpenVPN and layer 2 Tunneling Protocol are 256bit ssl-encrypted while PPTP comes having a 128bit that is strong. Even though our clients have their particular awareness of why and what things to work with and are not common, we urge Layer 2 Tunneling Protocol as process that is strong. It is much more secure than PPTP and less nerdy, but our clients may decide some of these around the world in the 4-7 system nodes.

 


Perl Development Journal

Or just search in Google/Bing for "Ali.as" (lol)


The CPAN Top 100

What is that? One of the few rankings in the world you probably will not want be at the #1...


This page is also a repository for SVN, CPAN modules, outdated modules and the place for other developers who don`t want to bother with their own sites.

Worked together with 100+ authors, 500+ modules and the number is still growing.


JSAN

The JavaScript Archive Network is an awesome resource for Open Source JavaScript software & libraries.

The old website has been moved to openjsan.org which is now live!


Squid

Using the Squid cache as a reverse proxy can save traffic and bandwidth and increase the speed of your web server enormously.


Content copyright 2002 Ali.as
All rights reserved.