SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Frank Coluccio Technology Forum - ASAP

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Frank A. Coluccio who wrote (1093)2/8/2000 1:29:00 PM
From: Frank A. Coluccio  Read Replies (1) of 1782
 
re: yesterday's DOS attack on Yahoo!, see CERT's (note) recent advisory which directly confronted this issue about a month ago:

cert.org

Note - CERT doesn't stand for anything anymore. It was started as a computer emergency response team effort. See FAQs concerning CERT at:

cert.org

"A2. What does "CERT" stand for?

"CERT" does not stand for anything. Rather, it is a registered service mark of Carnegie Mellon University.

"Its history, however, is that the present CERT® Coordination Center grew from a small computer emergency response team formed at the SEI by the Defense Advanced Research Projects Agency (DARPA) in 1988. The small team grew quickly and expanded its activities. As our work evolved, so did our name.

"When you refer to us in writing, it's OK to refer to us as the CERT® Coordination Center or the CERT/CC. Although you should not expand "CERT" into an acronym, it's appropriate to note in your text that we were originally the computer emergency response team."

------

Ironically, yesterday's attack took place during a meeting of NANOG when they were actually in the midst of discusing distributed (hence, the "D") denial of service attacks: DDoS.

Here's what one attendee had to say:

"It's an interesting coincidence that, at roughly the same time that the attack was taking place, we were sitting in the NANOG meeting listening to a presentation on Distributed Denial of Service attacks. It's definitely a major threat..."

Others are suggesting that ISPs bone up on a related RFC:

"...Read RFC2267. More people should be doing it, and most of
> these silly problems will go away."


I don't know about that.
>
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext