|Product Name||Surefire Km4 Led Weaponlight Conversion Kit - White And Ir Output (150 Lumens/120 Mw White/Infrared) - 2011 Model - Km4-Bk-Kit01 Black|
|Short Description||21 Oz. (600G)|
|Amazon.com||Buy on Amazon ~ B005SFF6YW|
|SKU||SF KM4-BK KIT01 NEW|
|Long Description||The V-Series KM4 LED conversion head, a direct screw-on replacement for the existing head on certain SureFire Millennium Universal® WeaponLights, Dedicated Forend WeaponLights, and Vertical Foregrip WeaponLights, produces both brilliant white light and intense IR output from one dual-LED emitter assembly. A bezel selector ring allows you to easily switch back and forth from white to infrared output-and it is self-locking so it stays securely on the selected light output, until you decide otherwise. The high-efficiency LEDs are virtually immune to failure since there's no filament to burn out or break, and provide significantly longer runtimes per set of batteries than incandescent emitters of similar output. The KM4 head features a Total Internal Reflection (TIR) lens that produces a comparatively tight beam suited for close- to medium-range applications. The O-ring sealed aerospace aluminum body is Mil-Spec hard anodized in your choice of Black (BK) or Desert Sand (TN). Kit includes: conversion head, new head and tailcap O-rings, O-ring lubricant, and applicator brush. Fits: M5(xx) Dedicated Forend WeaponLights, M9(xx) Vertical Foregrip WeaponLights, M96(xx) Millennium Universal WeaponLights|
|Search Google||by EAN or by Title|
Article of interest
We are not hosted at GoDaddy, but we are registered there and have our DSN settings stored with them. So when Anonymous attacked GoDaddy, we were impacted too.
It is very sad that hackers don't think about all of the people that will be impacted by their actions. Even though we were not attacked directly, we were impacted and most of our users were also impacted.
Our site was up and running the entire time and because many DNS servers cache the address to our site, we had a steady flow of traffic during the attack. But the number of visiters to the site was clearly lower than normal. We had a significant drop in visitors and even after things were fixed by GoDaddy things weren't quite normal again until quite late in the evening.
If you or your applications were impacted by this attack we are deeply sorry but there was nothing that we could do to prevent or recover from this. Just like you, all we could do is wait for GoDaddy to deal with the situation.
Here are some news links you can read relating to the attack:
Update 9/13/2012 - It appears that this may not have been an attack after all. GoDaddy is saying that this was not an attack but a configuration error that cascaded through their routers taking their services off line for about six hours. Be it an attack or an accidental configuration issue makes no real difference to the end users that couldn't gain access to the web sites hosted on or registered with GoDaddy.
Although this was all very annoying, no personal information seems to have been accessed such as passwords, credit card numbers, addresses, phone numbers or alike. Personally, being a technical person, I feel GoDaddy handled this situation quite well. I am not happy that it happened or that our users were unable to get to the site. But the tech team at GoDaddy did a very good job at correcting the problems.