SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Frank Coluccio Technology Forum - ASAP -- Ignore unavailable to you. Want to Upgrade?


To: Frank A. Coluccio who wrote (1093)2/8/2000 1:29:00 PM
From: Frank A. Coluccio  Read Replies (1) | Respond to of 1782
 
re: yesterday's DOS attack on Yahoo!, see CERT's (note) recent advisory which directly confronted this issue about a month ago:

cert.org

Note - CERT doesn't stand for anything anymore. It was started as a computer emergency response team effort. See FAQs concerning CERT at:

cert.org

"A2. What does "CERT" stand for?

"CERT" does not stand for anything. Rather, it is a registered service mark of Carnegie Mellon University.

"Its history, however, is that the present CERT® Coordination Center grew from a small computer emergency response team formed at the SEI by the Defense Advanced Research Projects Agency (DARPA) in 1988. The small team grew quickly and expanded its activities. As our work evolved, so did our name.

"When you refer to us in writing, it's OK to refer to us as the CERT® Coordination Center or the CERT/CC. Although you should not expand "CERT" into an acronym, it's appropriate to note in your text that we were originally the computer emergency response team."

------

Ironically, yesterday's attack took place during a meeting of NANOG when they were actually in the midst of discusing distributed (hence, the "D") denial of service attacks: DDoS.

Here's what one attendee had to say:

"It's an interesting coincidence that, at roughly the same time that the attack was taking place, we were sitting in the NANOG meeting listening to a presentation on Distributed Denial of Service attacks. It's definitely a major threat..."

Others are suggesting that ISPs bone up on a related RFC:

"...Read RFC2267. More people should be doing it, and most of
> these silly problems will go away."


I don't know about that.
>



To: Frank A. Coluccio who wrote (1093)2/9/2000 12:40:00 PM
From: Frank A. Coluccio  Read Replies (1) | Respond to of 1782
 
re: Crackers hit More Sites

[fac: DDoS/Distributed Denial of Service Attacks: A Conspiracy from Hell?]
-------

From the CNBC Site:

Computer vandals hit 2 more sites


By Bob Sullivan
MSNBC


Feb. 9 — A rash of electronic attacks on
high-profile Web sites continued Wednesday
with early morning assaults that knocked out
E*Trade, an online stock brokerage, and ZDNet,
a leading technology news site. The FBI was
investigating the attacks, which followed similar
assaults on Yahoo, Amazon.com, Buy.com,
CNN and eBay. Security experts fear the siege,
which prevents computer users from viewing the
sites but does not violate the integrity of the
systems themselves, will continue as the
computer vandals pick out new targets.

continued at msnbc.com
=================================================================

Of a related nature, last night I was able to "connect" to this site (SI), very barely, but could not pull down information for the slowness of response. This was from about 9:30 PM until after 11PM Eastern Time, at which time I tossed in the towel. Did anyone else have a similar experience?