Vista Posteos

cheap asics Off the network chain 1G flow behind the hackers play one hour 4-50000 yuan
Has occurred in six provinces, a network failure will STORM pushed to the cusp. May 22, Summer Storm, director of marketing economy, told reporters in the morning, the company has with the Beijing Office of the Commissioner of the communication network. Currently being net OCI and the Ministry under the guidance of the destruction to collect relevant data, and measure the damage of storm losses.
to Storm's so embarrassed that occurred on May 19 off the Internet with network events. 21 o'clock that night, Jiangsu, Anhui, Guangxi, Hainan,2010 ugg boots July 18 , this score , tut , so to, Gansu, Zhejiang Province 6 Internet users found that access to the site slow or inaccessible, some users may even directly off the network. China Telecom, China Unicom in 20 responded to at 23:00 on the 19th,christian louboutin discounts, said the network has been restored so smooth.
after the parties concerned to identify, the storm caused outage so the video is not the culprit. DNS resolution but a website was hacked off the network resulting from network congestion. Domain Name Service provider DNSPod webmaster WU Sheng told reporters that if the hacker attack again, according to the current conditions may not be anti-maintained.
DNS experts, domain name registrar Network Technology Officer Hu intelligence contacts that the parties concerned should complete upgrades to network security from top to bottom.
industry sources, the network fault the real culprit is the first attack of the hacker, is still difficult to catch the current. Underground hacker industrial chain of large and clear division of labor, and only knock down the chain in order to ultimately protect the security of the Internet.
On the morning of May 20 outside the Internet only when a DNS zone that his battlefield hacker attack each other, and then led to the PC terminal installed STORM initiating frequent domain name resolution requests the amount of days, spread to the global telecommunications servers.
DNS domain name management and Internet users but are not closely related to public concern, simply put, the domain name is the network address of the character with the intuitive way to describe the host, such as Sohu's domain name is sohu.com When the underlying DNS failure, Internet users view, is

DNSPod is a free intelligent DNS resolution sites, top with nearly 300,000 of its Web site to resolve domain names,"air jordan new shoes ", STORM will be in which the other more well known include VeryCd, rain forest wind, 4399, a small games.
sparked off such a massive network event.
This chain of transmission is roughly: hackers attack the opponent, can not fast break in the case of direct damage to the other side of the DNS system; attack coincided with the Storm's website with the video server located DNSPod, because STORM large number of terminals, and with the storm of advertising pop, upgrade requests frequently, causing the installation STORM PC users frequently initiated a huge amount of resolution requests that the capacity in excess of DNSPod, the overflow to other telecommunications server, resulting in a server room is a large number of other requests; server traffic anomaly, causing the server location of the telecommunications sector, alert, and then shut down the server DNSPod, which leads to more traffic to access the requested storm overflow; At the same time, because the server DNSPod for the nearly 30 million Web sites to provide domain name resolution, leading to these sites can not normally access.
WU says that there may be some of the chain starting the game in attacks PW website, their website has been played before the largest flow is 24G,asics tigers australia, but did not cause the subsequent chain of broken network.
unknown attacks, said extreme caution.
Pulse Network Intelligence CTO Hu told reporters, DNS services, should cause the security industry's concerns, the DNS service providers currently have nearly ten thousand, a lot of omissions.
for the disconnection event, Hu intelligence that there is another possibility: that there may be a short backbone network problems. According to the present way of DNS resolution, telecommunications servers can not ultimately resolve a domain name, the general will DNS 114 or megaupload the home page. Therefore, does not cause so much damage off the net.
However, Hu intelligence that, if the problem is really the backbone network, then the chance will be very small. Backbone net thing it is last December 26, 2006, Taiwan earthquake occurred a number of international submarine cable disruption,moncler vest men, resulting in nearby countries and regions, international and regional communications severely affected.

Hu intelligence that the best way to deal with is that by this incident alert authorities to thoroughly from top to bottom on the domestic security of the network upgrade, especially related to the DNS services above.
According to industry experts said that at present,cheap asics, Telecom scale attack, such as silver dressed as Mouwang website, attracting a large number of Internet users to click, or even access to sensitive account and password.
- 4 South American and emerging market countries, because their network was built relatively late,"cheap jordan high top " 色笑话排行前八名(色而, high starting point, it is the smooth transition.
wiped off hackers chain
the network event,"women jordans 2011 ", the parties should bear responsibility for what is currently no clear conclusion.
Storm Inc. and DNSPod have said they are the victims, Wu sound on the Internet for all users also made a statement of apology, he said there is no accountability to his clients to, DNS service, but free does not mean exemption, so the future is unclear whether there will be customers of accountability. close to the thousand dollars. As for whether operators should be responsible for a website host told reporters, as operators signed an agreement with the client, the relevant provisions generally is to ensure that more than 99% of normal use, and therefore by virtue of this two-hour off the network to ask responsibility, not reality.
Hu intelligence, said the real culprit is the first attack of hackers, hacker attacks,"wholesale jordans " 销售职员的《舍得价值图》, but that in the current technical conditions, is difficult to catch the current, because the behavior of tens of thousands of attack is control of the ? $ 3 million to black opponents, usually means, spend money hiring tens of thousands or even hundreds of thousands of hours of about 4-5 million,
gujic143590 17.10.2011 0 196
Publicidad

Bloque HTML
Comentarios
Ordenar por: 
Por página:
 
  • Aún no hay comentarios
Información de Entrada
Publicidad

 

 

 

Calificar
0 votos
Recomendar
Acciones
Categorías
Baby Blogs (6 publicaciones)
City Blogs (7 publicaciones)
Tech News (5 publicaciones)