|This article needs additional citations for verification. (November 2014) (Learn how and when to remove this template message)|
|Traded as||TWSE: 2332|
(as Datex Systems Inc.)
1994 (as D-Link Corporation)
|Douglas Hsaio (CEO), John Hsuan (Chairman)|
|Products||Hubs, Routers, DSL/Cable Gateways, Switches, Wireless Access Points, Storage and security IP cameras|
|Revenue||NT$ 26,614 million (2015)|
Number of employees
|Slogan||Building Networks for People|
D-Link Corporation (Chinese: 友訊科技) is a Taiwanese multinational networking equipment manufacturing corporation headquartered in Taipei, Taiwan. It was founded in March 1986 in Taipei as Datex Systems Inc. It began as a network adapter vendor and has gone on to become a designer, developer, and manufacturer of networking solutions for both the consumer and business markets.
In 2007, it was the leading networking company in the small to medium business (SMB) segment worldwide with 21.9% market share. In March 2008, it became the market leader in Wi-Fi product shipments worldwide, with 33% of the total market. In 2007, the company was featured in the "Info Tech 100", a listing of the world's best IT companies. It was also ranked as the 9th best IT company in the world for shareholder returns by BusinessWeek.
D-Link Corporation changed its name from Datex Systems Inc. in 1994, when it went public and when it became the first networking company on the Taiwan Stock Exchange. It is now publicly traded on the TSEC and NSE stock exchanges. It was founded by seven individuals including Ken Kao, the late Chairman of D-Link.
D-Link's products are geared towards the networking and communications market. Its business products include switches, surveillance network cameras, firewalls, iSCSI SANs and business wireless, while consumer products cover consumer wireless devices, broadband devices, and the Digital Home devices (which include media players, storage, and surveillance camera/NVR).
Examples of D-Link products
In January 2010, it was reported that HNAP vulnerabilities had been found on some D-Link routers. D-Link was also criticized for their response which was deemed confusing as to which models were affected and downplayed the seriousness of the risk.
In January 2013, version v1.13 for the DIR-100 revA was reported to include a backdoor in the firmware. By passing a specific user agent in an HTTP request to the router, normal authentication is bypassed. It was reported that this backdoor had been present for some time.
Computerworld reported in January 2015 that ZynOS, a firmware used by some D-Link routers (as well as ZTE, TP-Link, and others), are vulnerable to DNS hijacking by an unauthenticated remote attacker, specifically when remote management is enabled.
Later in 2015, it was reported that D-Link leaked the private keys used to sign firmware updates for the DCS-5020L security camera and a variety of other D-Link products. The key expired in September 2015, but had been published online for seven months.
In 2006, D-Link was accused of NTP vandalism, when it was found that its routers were sending time requests to a small NTP server in Denmark, incurring thousands of dollars of costs to its operator. D-Link initially refused to accept responsibility. Later, D-link products were found also to be abusing other time servers, including some operated by the US military and NASA.
On September 6, 2006, the gpl-violations.org project prevailed in court litigation against D-Link Germany GmbH regarding D-Link's alleged inappropriate and copyright infringing use of parts of the Linux kernel.
- Bloomberg Businessweek. "D-Link Corp." Retrieved July 11, 2012.
- Compiled from In-Stat Q1 2007 Wireless LAN Equipment Market Share Report
- In-Stat Q4/07 WLAN Market Share Report
- BusinessWeek Magazine, 'Info Tech 100' – Issue July 2, 2007
- "Which Routers Are Vulnerable to the D-Link HNAP Exploit?". January 18, 2010. Archived from the original on December 26, 2013.
- Yegulalp, Serdar. "D-Link's backdoor: What else is in there?". InfoWorld. Retrieved 2016-04-01.
- Constantin, Lucian. "DNS hijacking flaw affects D-Link DSL router, possibly other devices". Computerworld. Retrieved 2016-04-01.
- "In blunder threatening Windows users, D-Link publishes code-signing key". Ars Technica. Retrieved 2016-04-01.
- "Hacking the D-Link DIR-890L".
- "What the Ridiculous Fuck, D-Link?!".
- Leyden, John. "D-Link accused of 'killing' time servers. Time to stop freeloading". The Register.
- Ward, Mark. "Net clocks suffering data deluge". BBC.
- GPL-Violations.org project prevails in court case on GPL violation by D-Link Archived October 7, 2014, at the Wayback Machine.
|Wikimedia Commons has media related to D-Link.|