How to Get Your Website Online: A Step-by-Step Guide

Illustration of a laptop with a globe icon, representing how to get a website online.
How to Get Your Website Online: A Step-by-Step Guide to Launching Your Site.

1. Purchase a Domain

The domain name is the web address (www.myidea.com) where users can find your site.

You can purchase a domain at FlokiNET.

All you have to decide is on a TLC (for example: com, .net, org). Most of the TLCs we offer can help you register the domain anonymously. All we need from you is a valid e-mail address.

2. Choose a Web Hosting Plan

Web hosting is where your website’s files are stored and made accessible to visitors. FlokiNET provides shared hosting in four locations: Finland, Iceland, Romania, and the Netherlands. If you require additional resources, you can opt for a VPS (Virtual Private Server).

3. Set Up DNS

The Domain Name System (DNS) connects your domain name to your hosting server. You’ll need to configure your DNS settings correctly so that your domain points to your hosting server.

At FlokiNET we offer our own nameservers as well:

  • Nameserver 1: ns1.flokinet.net
  • Nameserver 2: ns2.flokinet.net
  • Nameserver 3: ns3.flokinet.net
  • Nameserver 4: ns4.flokinet.net

4. Build Your Website

Our Shared Hosting service is compatible with WordPress and includes special tools to install and manage your platform. Two of these tools include: Softaculous WordPress Manager and the WordPress Toolkit developed by CPanel itself.

5. Install SSL

Transport Layer Security (TLS) Certificates are used to authenticate a server and enable an encrypted connection between any visitor and the server.

On shared hosting, we offer Let’s Encrypt certificates for all configured domains for free.

6. Launch and Monitor

Once everything is set up, launch your site and monitor it for any issues. In case you need more details you can alway contact us at info@flokinet.is.

Join us for secure, reliable, and truly anonymous hosting, where your privacy is our top priority.

What are Dedicated Servers?

Dedicated servers graphic with FlokiNET logo, highlighting server performance, security, and control.
Discover the power of dedicated servers with FlokiNET. Boost your website’s performance, security, and control with our reliable hosting solutions.

What are Dedicated Servers?

Dedicated servers are a type of hosting service where a client rents an entire physical server that is exclusively dedicated to their use. This server is not shared with any other customers, providing complete control, high performance, and flexibility to meet specific needs.

Dedicated servers are commonly used for:

  • hosting websites;
  • applications;
  • databases;
  • game servers;
  • other services that require substantial resources or have particular security requirements.

Key Features and benefits of Dedicated Servers:

  1. Exclusive Use: The client has full control over the server and its resources, such as CPU, RAM, and storage. This exclusivity means that performance is not affected by other users, unlike shared hosting environments.
  2. Customizability: Dedicated servers can be customized to meet the specific needs of the client. This includes choosing the type of hardware, operating system, software, and server configuration.
  3. Performance: Since resources are not shared, dedicated servers can handle high traffic and intensive applications more efficiently, offering faster response times and lower latency.
  4. Security: With no other clients sharing the server, dedicated hosting provides a higher level of security. Clients can implement their own security measures, firewalls, and monitoring systems to protect sensitive data.
  5. Reliability: Dedicated servers are less prone to downtime since they aren’t affected by the activities or usage spikes of other users. This makes them a more reliable choice for mission-critical applications.
  6. Full Control and Access: Clients usually receive root or administrative access to the server, allowing them to configure and manage the server environment, install software, and make changes as needed.

What are Offshore dedicated servers?

Offshore dedicated servers are a type of dedicated hosting where the physical server is located in a country different from the client’s home country, usually in a jurisdiction known for its favorable legal framework regarding privacy, freedom of speech, or specific regulatory advantages. The same rules apply to any offshore hosting.

FlokiNET offers a large range of dedicated servers in four different locations:  Finland, Iceland, Romania and Netherlands.

Benefits of Using FlokiNET Dedicated Servers:

  • Anonymity and Privacy: With privacy-focused policies and offshore hosting locations, FlokiNET is ideal for users who want to ensure their data and identity are protected.
  • Freedom of Speech: Our commitment to free speech helps offers the opportunity to host content that might face censorship elsewhere.
  • Security: Advanced security features help protect servers against common threats like DDoS attacks and unauthorized access. We offer for most location free DDoS Protection.
  • Customization: We offers various server configurations to meet the unique needs of different users. All of our servers are enterprise and they range from standard servers to the newest generation of HP Servers.
  • No Data Sharing with Third Parties: We do not share customer data with third parties.

At FlokiNET,  your privacy and freedom of speech come first. With a strong commitment to data protection, security, and a censorship-free environment, FlokiNET is the perfect choice for those who want complete control over their online presence.

What is Anonymous Hosting?

Graphic with the FlokiNET logo and a gradient blue-green background. In the center is an illustration of a laptop screen displaying a generic user icon. The text reads: ‘#backtoschool What is Anonymous Hosting?’
FlokiNET logo on a blue-green gradient background with a laptop illustration and text.

Anonymous web hosting is a type of web hosting service that allows individuals or organizations to host a website without revealing their personal information or identity. The primary focus of anonymous hosting is to maintain privacy and anonymity, both for the website owner and the visitors.

How to host a website anonymously?

If you would prefer to host an anonymous website there are several steps to follow to ensure your identity and the server location are not easily traceable.

1. Choose a Privacy-Focused Hosting Provider

At FLokiNET we focus on keeping you identity anonymous.  We provide autonomous and flexible solutions, optimized to help you spread your ideas!

2. Register an Anonymous Domain

We do not need your personal information to register a domain. All we need is a valid e-mail address to be able to communicate.

3. Use Tor or I2P for Hosting

For maximum anonymity, consider hosting your site as a Tor hidden service (.onion domain) or on the I2P network. Using a TOR browser and our onion address you can place orders keeping you anonymous.

4. Use a VPN or Proxy to Manage Your Server

Always use a reliable VPN, proxy, or both when setting up and managing your server. Preferably use a VPN that doesn’t log user activity and allows payment in cryptocurrencies.

5. Set Up the Server with Privacy in Mind

Use open-source software and tools that prioritize security and privacy.

Regularly update your server to mitigate security vulnerabilities.

6. Anonymous Communication Channels

Avoid using your real email for registering anything. Use anonymous email providers like ProtonMail.

For further anonymity, use encrypted communication apps like Signal or Session for any interaction related to the website.

7. Monitor Your Website’s Privacy Regularly

Regularly audit your server and site for leaks that could expose identifying information.

By following these steps, you can minimize the risk of exposing your identity while hosting a website anonymously.

Benefits of Anonymous Web Hosting:

  • Privacy Protection: Users can host content online without revealing their identity, which is essential for privacy-conscious individuals, journalists, activists, or those living under restrictive regimes.
  • Free Speech: Helps maintain freedom of speech by allowing users to publish content without fear of retaliation or censorship.
  • Security Against Doxxing or Harassment: Protects users from being targeted for their online activities.
  • Avoiding Surveillance: Reduces the risk of surveillance or tracking by governments, corporations, or malicious actors.

Anonymous web hosting is a powerful tool for maintaining privacy and freedom online, especially for those in sensitive situations or with privacy concerns.

Spyware Company Seeks Legal Takedown

Illustration representing censorship and suppression of speech.

We have received a takedown notice from the company mSpy, alleging that the domain ddosecrets.com, specifically the section https://data.ddosecrets.com/MSpy/, is hosting stolen personal and corporate data belonging to them.

We frequently receive takedown notices for various reasons. With our customers’ consent, we sometimes publish these notices to shed light on the increasing misuse of the law to silence media, NGOs, and activists. This highlights the growing trend of censorship through legal pressures.

DDoSecrets, is an independent, non-profit collective dedicated to publishing leaked and hacked data in the public interest. Founded with the mission of promoting transparency and accountability by making information, often censored or hidden, accessible to the public. 

They aim to empower citizens with knowledge, holding powerful entities accountable and promoting justice and transparency in areas where information is often obscured or manipulated. Their Greenhouse Project, focuses on the preservation of data related to environmental issues, corruption, and corporate misconduct.

DDoSecrets is committed to fighting censorship with the Greenhouse Project.

Launched in January 2024, the Greenhouse Project is an initiative by Distributed Denial of Secrets aimed at combating censorship. It embodies the “publisher of last resort” concept, originally proposed by George Buchanan in 2007, ensuring that censored reporting and source files are preserved. By doing so, the project works to counteract the chilling effects of censorship and promote the free transmission of data in the public interest.

More information here 👉https://www.cjr.org/the_media_today/qa_emma_best_ddosecrets.php

https://www.404media.co/ddosecrets-mirrors-wikileaks-data-after-assange-plea-deal

Historically, DDoSecrets been censored by entities with questionable records when it comes to human rights, including Russia, Indonesia and Elon Musk.

Outside of the complaint itself, mSpy has also made sensationalist claims about the data and its source, downplaying the authenticity of the data leak and framing it as a politically motivated attack towards the Ukranian Army, rather than addressing the actual security concerns and privacy violations associated with the breach.

👉https://www.currenttime.tv/a/rossiya-prilozhenie-mspy/33050441.html

mSpy has a negative trackrecord when it comes to securing data secretly collected by it’s spyware (passwords, call logs, text messages, and location data). Despite previous security breaches in 2015, mSpy failed to secure its systems adequately again in 2018,  exposing without authentication, customer details. When alerted to the leak, the company followed the same pattern, downplaying its severity.

As always, we have forwarded the request to our client for comment:

“We don’t have the time, energy or the inclination for tripe. Nevertheless, we may be found at magnet:?xt=urn:btih:BBDC678EC3E0EC699611631C45137B0A018CD47E”, said Emma Best of Distributed Denial of Secrets.”

We have decided to ignore this takedown notice for the following reasons:

  1. Public Interest and Transparency: The data hosted on ddosecrets.com exposes the reprehensible practices of mSpy. This is not just a matter of public interest; it is a public necessity. People have a right to be informed about the unethical and potentially illegal activities of companies that invade their privacy.
  2. mSpy’s Questionable Practices: mSpy, a notorious spyware maker, has a history of unethical behavior, including the covert collection and misuse of personal data. This takedown notice is a blatant attempt by mSpy to cover up their misdeeds. We refuse to be complicit in their scheme to silence the truth.
  3. Protection of Whistleblowers: The dissemination of this data appears to have been done by whistleblowers aiming to expose the questionable practices of mSpy. Whistleblowers play a crucial role in maintaining transparency and upholding ethical standards in society. We stand by the principle of protecting those who bring critical issues to light, especially when it concerns public safety and privacy.
  4. Misinterpretation of Legal Protections: While mSpy cites various data protection laws such as GDPR and CCPA, the context of this data publication is crucial. mSpy’s invocation of GDPR, CCPA, and other data protection laws is a transparent ploy to manipulate legal frameworks designed to protect individuals, not corporations that engage in surveillance and data exploitation. The public interest in exposing mSpy’s actions far outweighs their claims of legal protection.
  5. Commitment to Free Speech: As a network service provider, we are committed to upholding the principles of free speech and expression. Censoring content that reveals significant issues about corporate misconduct goes against these principles. We vehemently support the principles of free speech and will not be bullied into censoring content that reveals corporate corruption and privacy violations.
  6. Preventing Misuse of Takedown Mechanisms: The misuse of takedown notices by entities like mSpy to suppress information about their unethical practices is a concerning trend. This takedown notice is a textbook example of a company trying to intimidate and silence critics through legal threats. We categorically reject this and will not allow mSpy to misuse takedown mechanisms to hide their unethical behavior.

In light of the above reasons, we believe it is in the best interest of the public to keep the information accessible. We encourage organizations to adopt ethical practices and transparency in their operations rather than attempting to hide behind legal threats.

The request (via Cloudflare):


Cloudflare received an abuse report regarding:
ddosecrets.com

Please be aware Cloudflare is a network provider offering a reverse proxy, pass-through security service. We are not a hosting provider. Cloudflare does not control the content of our customers.

Below is the report we received:

Reporter’s Name: Brainstack
Reporter’s Email Address: pr@brainstack.team
Reporter’s Company Name: Brainstack

Reported URLs:
https://data.ddosecrets.com/MSpy/

Logs or Evidence of Abuse: Dear Cloudflare Team,

I am writing to formally lodge a complaint regarding the domain name ddosecrets.com, which appears to be utilizing your network services. The website, specifically the section found at https://data.ddosecrets.com/MSpy/, is currently hosting stolen data, including personal information of users and confidential corporate data belonging to MSpy, a brand of our company. The publication of this data is unauthorized and illegal under various data protection and privacy laws.

Publication of Stolen Personal Data:
The website hosts personal data of users, including but not limited to names, addresses, email addresses, and other sensitive information. This is a direct violation of privacy rights protected under laws such as the General Data Protection Regulation (GDPR) in the European Union, the California Consumer Privacy Act (CCPA) in the United States, and other international data protection laws. According to GDPR (Articles 5 and 6), personal data must be processed lawfully, fairly, and transparently, with explicit consent required from data subjects for any public sharing. The unauthorized disclosure of this information poses severe risks, including identity theft, fraud, and other malicious activities that could harm individuals.

Unauthorized Disclosure of Corporate Data:
Furthermore, the website contains proprietary and confidential information from MSpy, obtained and published without authorization. This breach of confidentiality and intellectual property rights disregards established trade secret laws and contractual obligations designed to protect corporate data from unauthorized dissemination. Such actions not only undermine our company’s competitive advantage but also violate our fundamental right to safeguard sensitive business information.

Legal Implications:
The unauthorized hosting and publication of this data not only violate privacy and data protection laws but also constitute criminal offenses. Specifically, the Computer Fraud and Abuse Act (CFAA) in the United States (18 U.S.C. § 1030) criminalizes unauthorized access to computer systems and the theft of data. It is imperative to highlight that even though Cloudflare operates pass-through network services and not hosting services, your organization can still be implicated in criminal investigations related to data theft and unauthorized disclosure. By continuing to facilitate the operations of ddosecrets.com, your organization may be considered complicit in these illegal activities, potentially facing criminal charges as accomplices.

It is important to emphasize that personal data is a highly sensitive matter globally, actively protected by robust legal frameworks aimed at safeguarding individual privacy and data security. The unauthorized disclosure and exploitation of personal data not only violate these legal protections but also undermine the fundamental rights and freedoms of individuals.

Given the gravity of this situation, we urgently request the following actions:

– Immediate Action: Take all necessary measures to prevent further unauthorized dissemination of stolen data by ceasing to provide network services to ddosecrets.com.
– Thorough Investigation: Conduct a comprehensive investigation into the circumstances surrounding the illegal activities. Identify the responsible parties and take decisive measures to prevent recurrence.
– Notification: Provide us with prompt updates on the actions taken to address this complaint and the safeguards implemented to prevent similar incidents in the future.

Failure to address this issue promptly and effectively may lead to legal actions against all involved parties, including potential criminal charges for complicity in the unauthorized distribution of stolen data. We stress the critical legal and reputational risks associated with non-compliance with data protection laws and the facilitation of unauthorized content.

Thank you for your immediate attention to this matter. We trust that you will act swiftly and decisively to rectify this situation and prevent further harm.


Please address this issue with your customer.

Regards,

Cloudflare Trust & Safety

The Perfect Pair: FlokiNET Servers and High-Performance GPUs

Servers with High-Performance GPUs.

FlokiNET offers a range of dedicated servers that can be paired with powerful GPUs to meet your demanding workloads. Lets have a look at what our GPU portfolio has to offer!


– NVIDIA A100: Ideal for high-precision tasks such as scientific computing, engineering applications, and physics simulations. Its extensive support for various tensor precisions (TF32, BFLOAT16, FP16, INT8) makes it highly suitable for deep learning training and inference, making it a versatile choice for data centers focused on AI, machine learning, and HPC workloads.  A perfect match with the following dedicated servers: DL380 Gen 10 and DL385 Gen 10 Plus V2! 

-NVIDIA L40S: the BEST universal GPU is built on the NVIDIA Ada Lovelace architecture and boasts exceptional performance for a wide array of applications, including:
Generative AI: Supercharge image generation with up to 200 stable diffusion images per minute.
Large Language Model (LLM) Inference: Experience lightning-fast inference with low latency for models like Llama 2.
3D Graphics and Rendering: Accelerate complex workflows with third-generation RT Cores and hardware-accelerated motion blur.

Video Content: Streamline video processing and enhance AI video performance with up to 99% better energy efficiency.
The L40S is data center-ready, offering reliability, security features like secure boot, and compliance with industry standards like NEBS Level 3.

Excels in FP32, TF32, BFLOAT16, FP16, FP8, INT8 for deep learning, AI training and inference, graphics rendering, edge computing, real-time video analytics, healthcare AI, autonomous vehicles, and recommendation systems. Another perfect match with our DL380 Gen 10, DL385 Gen 10 Plus V2! 


-NVIDIA L4 Tensor Core GPU: Versatile accelerator designed to enhance a wide array of workloads, including video processing, AI tasks, virtual desktops, and graphics rendering. Leveraging the NVIDIA Ada Lovelace architecture and fourth-generation Tensor Cores, it delivers exceptional energy efficiency and up to 120X faster AI video performance compared to CPU-based solutions. Its single-slot, low-profile form factor makes it easy to integrate into various server environments.

Efficient in FP32, TF32, BFLOAT16, FP16, FP8, INT8 for inference tasks, media processing, virtualized workloads, edge AI, real-time video processing, IoT applications, smart devices, and financial AI. Ideal for the following dedicated servers: DL360 Gen 10, DL360 Gen 11 and BL460c Gen 10! 

– NVIDIA A2: Suitable for entry-level AI inference, edge computing, and virtualization tasks. Its low power consumption and compact design make it ideal for smart devices, real-time analytics, and mobile AI applications. It is an excellent choice for edge deployments and scenarios requiring efficient performance in constrained environments.

Suitable for FP32, TF32, BFLOAT16, FP16, INT8 for entry-level AI inference, edge computing, virtualization, smart devices, real-time analytics, autonomous systems, healthcare AI, and mobile AI applications. Perfect match with DL360 Gen 10, DL360 Gen 11 and BL460c Gen 10! 

– NVIDIA T4: Designed for a wide range of modern applications including machine learning, deep learning, and virtual desktops. Its energy-efficient design and small form factor make it ideal for mainstream enterprise servers, cloud computing, and edge deployments. The T4 is particularly effective for inference tasks, media processing, and virtual desktop infrastructure (VDI). Compact, energy-efficient powerhouse designed for diverse workloads. Powered by NVIDIA Turing Tensor Cores, it excels at accelerating deep learning, machine learning, video trans-coding, and virtual desktops. Its low-profile, single-slot design makes it ideal for space-constrained environments, while its 70W power limit ensures optimal efficiency. Another perfect match with DL360 Gen 10, DL360 Gen 11 and BL460c Gen 10! 


GPU and the AI Development

GPU and the AI Development.

GPUs have revolutionized the field of AI development, enabling researchers and developers to train complex models faster and more efficiently. Their parallel processing capabilities are perfectly suited for the computationally intensive tasks involved in AI, such as deep learning and neural networks.

Choosing the right GPU for your server is a crucial step in optimizing your infrastructure for the tasks at hand. By carefully considering your needs, budget, future plans, and the technical specifications of each option you can make an informed decision that will empower your server to reach its full potential.

Feel free to reach out to FlokiNET’s experts for personalized guidance and support in selecting the ideal GPU for your specific requirements.

Now let’s match you up with our servers!

Let’s see how we can team up to help you make the best decision for your server. A more elaborated match series on how to choose the right GPU for your FlokiNET dedicated server can be found below. 

360 Gen 10 – 2x Platinum 8173M, 28-core CPUs – Start at €​​​​​​​467.00/m!

  • Ideal for AI and Machine Learning: For this high-performance setup, the NVIDIA Tesla T4 would be an excellent choice. It offers high computational power and is optimized for AI and machine learning workloads.

380 Gen 10 – 2x Gold 6132, 14-core CPUs (mostly for LFF storage and GPU) – Start at €433.00/m!

  • Great for Storage and GPU Tasks: The NVIDIA L4 could be a suitable option for this server. It provides a balanced performance for storage and GPU-intensive tasks, aligning well with the server’s configuration and intended usage.

385 Gen 10 Plus V2 – 2x AMD EPYC 7543, 32-core CPUs – Start at €5978.90/half year!

  • Perfect for High-Performance Computing: Given the robust CPU configuration, the NVIDIA L40s would be a fitting choice. It offers high performance and is well-suited for high-performance computing tasks, aligning with the capabilities of the 32-core CPUs.

360 Gen 11 – Gold 6448H, 32-core CPUs – Start at €7953.00/half-year!

  • Ideal for Versatile Applications: This server can benefit from GPUs like the NVIDIA Tesla T4 or the NVIDIA L40s. The Tesla T4 excels in AI and machine learning tasks, while the L40s offers high performance for general computing tasks, ensuring versatility based on workload requirements.

Have any questions or suggestions? Let us know on our social media platforms or send us an e-mail at info@flokinet.is and we’ll get right back to you!

7 Tips to Help You Choose the Right GPU

How to Choose the Right GPU.

How to Choose the Right GPU for Your Server: Ultimate Guide

Selecting the right GPU for your server is a critical decision, as it directly impacts performance, efficiency, and ultimately, your bottom line. Whether you’re into the AI, rendering high-definition videos, or running complex simulations, your GPU is the engine that powers your server’s capabilities. This guide will walk you through the essential factors to consider and offer 7 expert tips to ensure you make the best choice. But first things first.

What is a GPU?

What is a GPU?

In a nutshell it is a specialized processor designed to rapidly manipulate and alter memory to accelerate the creation of images in a frame buffer intended for output to a display device. While originally developed for rendering graphics, GPUs have evolved to excel in parallel processing, making them ideal for tasks that require handling massive amounts of data simultaneously.

While both GPUs and CPUs are essential components of a computer system, they serve distinct purposes.

  • CPU: Responsible for executing sequential instructions and general-purpose tasks. It is able to handle a wide variety of operations but is less efficient at processing large datasets in parallel.
  • GPU: Designed for parallel processing, GPUs excel at handling multiple tasks simultaneously. This makes them perfect for tasks like rendering graphics, running simulations, and accelerating machine learning algorithms.

What are the different features that GPUs for servers have?

Server GPUs are specifically designed for data center environments and are optimized for performance, efficiency, and reliability. Below we will be comparing a few cards from our product list, based on their features:

  • Higher memory bandwidth: To handle large datasets efficiently.
    •  A100: 1,935GB/s
    •  L40S: 864GB/s
    •  L4: 300GB/s
    •  A2: 200GB/s
  • Precision: refers to the detail and accuracy with which numerical values are represented and processed, influencing the performance and suitability of the GPU for various computational tasks:
    • FP64 (High Precision): Used in scientific computing for simulations, climate modeling, engineering applications, financial modeling, physics simulations.
    • FP32 (Medium Precision): Utilized in graphics rendering for game development, 3D modeling, and animation, general-purpose computing, machine learning training, data analytics, VR, real-time simulations, and computational photography.
    • Tensor Float 32 / BFLOAT16 / FP16 (Low Precision): Ideal for deep learning with large datasets, AI research, image recognition, natural language processing, recommendation systems, speech recognition, autonomous vehicle development and scalable AI services in cloud computing.

When choosing the right GPU for your dedicated server keep these tips in mind: 

7 tips to choose the right GPU for your server.

1. Identify Your Needs

The first step is understanding the exact role your GPU will play in your server environment. Are you building a powerhouse for AI and machine learning algorithms? Do you need to render high-quality videos or graphics? Perhaps you’re hosting a demanding gaming server. Each use case has different demands on GPU capabilities.

2. Determine Your Budget
GPUs come in a wide range of prices. It’s essential to establish a realistic budget that aligns with your needs and overall project goals. Don’t forget to factor in additional costs like power consumption and cooling requirements, as high-performance GPUs can be power-hungry. Balancing performance with cost is key to getting the most value out of your investment.

3. Evaluate Your Current Infrastructure
Before diving into GPU selection, take a close look at your existing server setup. What resources do you rely on currently? Go through the documentation of the GPU you plan on using and compare its features and compatibility with the current set-up you have and how you plan to scale/grow.

Consider the following:

  • PCIe Slots: Ensure your server motherboard has the necessary PCIe slots to support the GPU.
  • Power Supply: Check if your power supply unit (PSU) can provide sufficient power for the GPU.
  • Physical Space: Verify that your server chassis has enough space to accommodate the GPU, especially if it’s a large, high-end model.
  • Driver Support: Ensure that the GPU has stable drivers that are compatible with your server’s operating system and software stack.

4. Explore Various GPU Server Choices
While the market is flooded with multiple options – we have a select list of GPUs, each offering unique features and specifications. Take the time to research different models and compare:

  • CUDA Cores/Stream Processors: These determine the GPU’s ability to handle parallel tasks. More cores generally mean better performance for complex calculations.
  • VRAM (Video RAM): This is essential for handling large datasets and textures. Ensure the GPU has enough VRAM to manage your applications without bottlenecks.
  • Clock Speed: Higher clock speeds can improve performance, especially for applications requiring quick data processing.
  • TDP (Thermal Design Power): This indicates the GPU’s power consumption and heat output. Ensure your server can handle the thermal and power requirements of the GPU.

Read reviews, benchmark results, and expert opinions to understand how different GPUs perform in real-world scenarios.

5. Ask the Experts
Don’t hesitate to contact us, our experienced team is here to assist. They can offer valuable insights and recommendations based on your specific requirements and budget. Explain your use case in detail, and we can guide you towards the most suitable GPU options for our dedicated servers.

6. Consider Scalability and Plan for the Future
Your computational needs might evolve over time, so it’s wise to choose a GPU that can scale with your demands. Consider models that allow for future upgrades or the addition of more GPUs to your server. Investing in a scalable solution can save you money and hassle in the long run.

7. Find a Trustworthy Provider
Purchasing your GPU from a reputable vendor is crucial. Look for vendors with a proven track record of reliability and excellent customer support. A solid warranty can also provide peace of mind in case of any issues. Don’t solely focus on price; factor in the vendor’s reputation and after-sales service.


Stay tuned for our upcoming article, where we will guide you on how to pair your FlokiNET dedicated server with the ideal GPU for optimal performance. Feel free to reach out to FlokiNET’s experts at info@flokinet.is for personalized guidance and support in selecting the ideal GPU for your specific requirements.

World Day Against Cyber Censorship

Today we celebrate World Day Against Cyber Censorship, a major online event that focuses on raising awareness of the various ways governments around the world restrict and censor free expression on the Internet. First recognized on 12 March 2008 at the request of Reporters Without Borders and Amnesty International, this day serves as an important opportunity for reflection and action against online censorship. At FlokiNET, we join in the celebration of World Day Against Cyber Censorship and reaffirm our commitment to fostering an Internet space that values freedom of expression.

According to freedomhouse.org, a non-profit organization based in Washington, D.C., best known for its policy advocacy on issues of democracy, political freedom, and human rights, the following key findings were noted in the past year: 

Global internet freedom on the decline

For the 13th year in a row, global internet freedom declined, with Iran facing increased digital repression, including internet shutdowns and the blocking of apps such as WhatsApp and Instagram, aimed at suppressing anti-government protests. Myanmar almost overtook China as the world’s worst internet freedom environment, a title China held for nine years. In the Philippines, President Rodrigo Duterte used an anti-terrorism law to suppress critical news sites, signalling a worrying deterioration.

Multiple attacks on freedom of expression

Around the world, attacks on free expression surged, with 55 out of 70 countries experiencing legal repercussions for online expression. More alarmingly, 41 countries reported physical attacks or killings linked to online expression. The severity peaked in Myanmar and Iran, where death sentences were handed down for crimes related to online expression. Belarus and Nicaragua saw harsh repression, with dictators Alexander Lukashenko and Daniel Ortega resorting to harsh prison sentences to stifle online speech.

AI and disinformation

AI poses a significant threat to online spaces, with 47 governments doubling down on the use of commentators to manipulate discussions. In at least 16 countries, AI-generated text, audio and images have been used to shape narratives, smear opponents and influence public discourse.

AI and online censorship

AI is enabling governments, particularly authoritarian regimes, to increase online censorship through technologies such as chat bots. In 21 countries, legal frameworks require digital platforms to use machine learning to suppress disfavored speech. Despite these advances, 41 governments continue to block websites protected by freedom of expression standards.

Protecting internet freedom 

Protecting internet freedom is crucial in the face of increasing AI-driven digital repression. While private companies are contributing to self-regulation, concerns about human rights remain. Democratic policymakers must work with global civil society experts to establish human rights-based standards for AI development and deployment.

What can you do? 

In the fight against cyber censorship, consider taking the following steps:

Support, educate yourself and others, and advocate for internet freedom: Get involved in advocacy efforts, support organizations that promote Internet freedom, and stay informed about issues related to online censorship.
You can stay informed by following organizations such as the National Coalition Against Censorship, Reporters Without Borders, Amnesty International, Electronic Frontier Foundation, Freedom House, Freedom of the Press Foundation.

Use encrypted communication tools: Use encrypted messaging services and email platforms to secure your communications and protect sensitive information, such as Signal, Element and Proton Mail. 

Support decentralized platforms: Explore and promote decentralized social media platforms and communication tools that are less susceptible to centralized control and censorship. Some platforms we recommend are Mastodon and Matrix for anti-censorship communication.

Stay informed about online safety: Keep up to date with the latest developments in online security, use strong passwords and regularly update your software to mitigate potential cyber threats. Get the latest news and updates on cyber security from sources like KrebsOnSecurity, Schneier on Security and Ars Technica.

Access censored content (if blocked in your region): Use tools such as Tor for anonymous browsing and VPN as a secure tunnel for your internet traffic to access censored content, giving you a safe and private way to browse the internet without restrictions.

Have any questions or suggestions? Let us know at info@flokinet.is or on our social media channels.

World Password Day

World Password Day is a day to be aware of the important role passwords play in our digital lives. Here are five important tips:

  1. Use a unique password for each online account that consists of a combination of letters, numbers, and symbols. A strong password is one of the most important measures you can take to secure your online accounts. By using a unique password for each account, you can prevent a hacker from gaining access to multiple accounts if they manage to crack one password.
  2. Never use personal identifiers in your password. Avoid using any information that can be easily guessed or found online, such as your name, birth date, or phone number. Instead, use a combination of random letters, numbers, and symbols that are difficult to guess.
  3. Use a password manager to generate and store your passwords securely. Password managers are software applications that can generate and store complex passwords for you. They can also fill in login credentials automatically, saving you time and effort. Some popular password managers include KeepassXC, 1Password, and Bitwarden. KeepassXC is free and open source software while 1Password and Bitwarden are pais services.
  4. Use two-factor authentication for an extra layer of protection. Two-factor authentication (2FA) adds an extra layer of security by requiring you to provide two forms of identification before accessing an account. This could be a password and a fingerprint, a password and a one-time code sent to your phone, or a password and a security token. We recommend using an open-source 2FA app like FreeOTP+.
  5. Regularly check if your data has been compromised in a data breach by visiting haveibeenpwned.com. Have I Been Pwned is a free website that allows you to check if your email address has been included in any known data breaches. If your email address has been compromised, it’s important to change your password for that account immediately.

Another year, another censorship attempt

On January 15th, 2023, we received a Cease and Desist letter (you can see the letter at the bottom of this page) from the ‘General Counsel’ of Cellebrite Ltd., requiring [us] to immediately shut down the site named “EnlaceHacktivista.org” on the grounds that their intellectual property was made public as part of a series of leaks which also include “Micro Systemation AB” from Sweden. Within these leaked data, it is possible to find documentation with tools developed to break into private devices (phones, tablets and laptops) and extract information.

Both companies are notorious for selling their products to oppressive regimes with very poor human rights records, which use these tools to harass journalists and put their work and lives in danger. So, while a cease and desist letter is an internationally recognized procedure, according to the EU law this leak is protected by the DIRECTIVE (EU) 2019/1937 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 October 2019.

We take the protection of our customers’ privacy, security, and general rights seriously and in this case, we have determined this request clearly attempts to use copyright laws to suppress free speech and media, which is not legal as detailed in the DIRECTIVE 2001/29/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. As a result, we have politely informed the representative of Cellebrite Ltd. that we will not take action.​​​​​​​​​​​​​​ Last year ended with a similar request regarding this platform: https://blog.flokinet.is/2022/11/11/censorship-in-ecuador/

More information about these companies can be found here:

https://theintercept.com/2021/06/14/myanmar-msab-eu-technology-regulation/

https://signal.org/blog/cellebrite-vulnerabilities/

https://www.theguardian.com/technology/2021/apr/22/signal-founder-i-hacked-police-phone-cracking-tool-cellebrite

=======

The letter can be found here:

Dear Sir / madam:

I am Cellebrite DI Ltd. and its group companies (“Cellebrite”) General Counsel. It has come to our attention that person(s) operating under the name of “EnlaceHacktIvista.org” (“Enlace”) have a domain under the name of www.EnlaceHacktIvista.org. It has further come to our attention that FlokiNET are the ISP hosting this Enlace domain. On January 13, 2023 Enlace issued a statement on their website notifying of the receipt of certain Cellebrite owned files from an authorized person, and further indicated the “leaks” are available for download in different locations including their said domain.

Cellebrite hereby requires that you immediately shut down www.EnlaceHacktIvista.org and cease and desist from making available or enabling the availability, on such website or otherwise, of any of Cellebrite’s copyrighted software, documentations, scripts or any other artifact identified to be owned by Cellebrite, including, without limitation, the Cellebrite installation files (collectively the “Cellebrite Materials”).

All use or distribution of the Cellebrite Materials is subject to Cellebrite’s end user license agreement (“EULA”). Cellebrite’s EULA provides that the license grant is subject to the terms and conditions of the EULA, including without limitation the restrictions on transfer, assignment or distribution, making the grant of the license conditional on compliance with the terms of the EULA. Under Cellebrite’s EULA, Cellebrite Materials may not be sublicense, transferred or assigned without Cellebrite’s prior written consent. Under Cellebrite’s EULA, Cellebrite Materials may not be distributed, including by selling a product on a secondhand market, nor is it permitted to attempt to distribute Software. As Cellebrite’s EULA does not permit transfer, assignment, distribution or an attempt to distribute Software or other Cellebrite Materials, publishing of Cellebrite Materials infringes Cellebrite’s copyright and other intellectual property rights in such materials.

We, therefore, demand that you immediately cease and desist from making available or aiding in allowing availability of any Cellebrite Materials on the said website www.EnlaceHacktIvista.org or otherwise. Your failure to remove the website or our materials from the website and to provide us with written assurance that you have done so within seven (7) days of the date of this letter will force us to explore additional means of legal redress available to Cellebrite in connection with the unauthorized use of Cellebrite’s copyrighted Software and other materials.

This letter is not intended to exhaust or waive any claim or argument that Cellebrite have or may have. Nothing in this letter (or any lack thereof) shall prejudice any of Cellebrite’s claims, rights or cause of action against you or any other party acting on your behalf.

Respectfully,

General Counsel

Cellebrite DI Ltd.

As we stated before, we will not censor free press and the freedom of speech!

Censorship in Ecuador

After we received a request from the Australian Police in May this year (see more here), in which they wanted to censor one of our customers for leaking important data about the abuse happening in the Island of Nauru, we received another request from law enforcement in Ecuador.

Spanish original:

“Buenas tardes señores, Flokinet

Les saludamos de Ecuador para reportar que la Ip 185.165.170.80 alojado en su hosting se encuentra publicando información que afecta a la integridad de la Empresa Pública del Estado Ecuatoriano, por lo consiguiente solicito a ustedes como provedores de servicio de internet, tengan a bien dar de baja mencionado foro.

https://enlacehacktivista.org/index.php/Extractivist_Leaks/es#ENAMI_EP

Saludos cordiales,


Dirección de Ciberinteligencia”

English translation:

Good afternoon gentlemen, Flokinet

We greet you from Ecuador to report that the Ip 185.165.170.80 hosted on your hosting is publishing information that affects the integrity of the Public Company of the Ecuadorian State, therefore I request you as internet service providers, please remove the above mentioned forum.

https://enlacehacktivista.org/index.php/Extractivist_Leaks/es#ENAMI_EP

Kind regards,


Directorate of Cyber Intelligence

This time, Ecuadorian law enforcement is focused on shutting down the hacktivist group Guacamaya which leaked 400000 e-mails uncovering the cyber vulnerability of the military corps.

As a reply, we remain committed to our fight for a free press so our answer remains clear: We will not take down whistleblowers’ websites.