Home > Uncategorized > How One Man Fought His ISP’s Bad Behavior and Won

How One Man Fought His ISP’s Bad Behavior and Won

December 31st, 2013 12:09 admin Leave a comment Go to comments

The Internet

An anonymous reader writes “Eric Helgeson documents his experience with an unscrupulous ISP that was injecting affiliate IDs into the URLs for online retailers. ‘It appears that the method they were using was to poison the A record of retailers and do a 301 redirect back to the www cname. This is due to the way apex, or ‘naked’ domain names work.’ Upon contacting the ISP, they offered him access to two DNS servers that don’t perform the injection, but they showed no indication that they would stop, or opt-out any other subscribers. (It was also the only wireless provider in his area, so he couldn’t just switch to a competitor.) Helgeson then sent the data he gathered to the affiliate programs of major retailers on the assumption that they’d be upset by this as well. He was right, and they put a stop to it. He says, ‘ISP’s ask you to not do crummy things on their networks, so how about they don’t do the same to their customers?’”

Source: How One Man Fought His ISP’s Bad Behavior and Won

Related Articles:

  1. Heavy Metal and Emergent Behavior
  2. Anatomy of a SQL Injection Attack
  3. FCC Relying On Faulty ISP Performance Data
  4. 2 Chinese ISPs Serve 20% of World Broadband Users
  5. RSS War! (As Fought On Twitter, Naturally)
Categories: Uncategorized Tags:
blog comments powered by Disqus