EAN-137290000189772   EAN-13 barcode 7290000189772
Product NameDUNU DN-1000 Hybrid earphone (twin BA + 1 dynamic drivers)
CategoryElectronics / Photography: Computer Hardware
Amazon.comA Buy on Amazon ~ B00GH752AI
Price New158.62 US Dollars    (curriencies)
Price Used83.00 US Dollars    (curriencies)
Width5.79 inches    (convert)
Height1.57 inches    (convert)
Length7.91 inches    (convert)
Weight10.4 ounces    (convert)
BindingPersonal Computers
  • Hybrid drivers design: Dual Balanced Armature and Single Dynamic Driver
  • Excellent Build quality
  • Various silicon tips of various sizes
Long DescriptionCommitted to present the best audio performance, DN-1000 is designed to be one of the finest earphones. By utilising the innovative "Hybrid technology" which drivers, it creates an amazing sound that is suitable for almost all music. Sound Signature: Natural rich bass with excellent treble extension and crystal clear clarity. Accessories: 10 sets of Eartips 1 pair of Earhook 3.5mm Female to 6.5mm Male Adapter 3.5mm Female to 2-pin Male Adapter Carry Box Soft leather Carry pouch Shirt Clip Technical Specification: Type: Dynamic Balanced Armature(10mm) Sound pressure level: 98+/-2dB Impedance: 10Ω Frequency Response: 16Hz-22KHz Noise Attenuation: 26dB Plug: 3.5mm Gold-Plated Cable Length: 1.20M
Similar Items0609788662945: Pyst Rca Cables (6 Inches)
0655942190458: Comply Tx-500 Foam Tips 3-Pair Pack Medium Size-(Black)
0655942170917: Comply T-500 Series Foam Tips (Black, 3 Pairs, Medium)
0655942190571: Comply Tx-500 Series Foam Tips (Black, 3 Pairs, S/M/L)
Created01-19-2015 9:49:17am
Modified02-27-2017 9:58:41am
Search Googleby EAN or by Title
Query Time0.0085649

We are not hosted at GoDaddy, but we are registered there and have our DSN settings stored with them. So when Anonymous attacked GoDaddy, we were impacted too.

It is very sad that hackers don't think about all of the people that will be impacted by their actions. Even though we were not attacked directly, we were impacted and most of our users were also impacted.

Our site was up and running the entire time and because many DNS servers cache the address to our site, we had a steady flow of traffic during the attack. But the number of visiters to the site was clearly lower than normal. We had a significant drop in visitors and even after things were fixed by GoDaddy things weren't quite normal again until quite late in the evening.

If you or your applications were impacted by this attack we are deeply sorry but there was nothing that we could do to prevent or recover from this. Just like you, all we could do is wait for GoDaddy to deal with the situation.

Here are some news links you can read relating to the attack:

Update 9/13/2012 - It appears that this may not have been an attack after all. GoDaddy is saying that this was not an attack but a configuration error that cascaded through their routers taking their services off line for about six hours. Be it an attack or an accidental configuration issue makes no real difference to the end users that couldn't gain access to the web sites hosted on or registered with GoDaddy.

From GoDaddy:

Although this was all very annoying, no personal information seems to have been accessed such as passwords, credit card numbers, addresses, phone numbers or alike. Personally, being a technical person, I feel GoDaddy handled this situation quite well. I am not happy that it happened or that our users were unable to get to the site. But the tech team at GoDaddy did a very good job at correcting the problems.