inherit
129611
0
Feb 1, 2013 2:11:48 GMT -8
ImMeSoHi
"Oh Smeg. What the smegging smeg's he smegging done?"
1,342
August 2008
immesohi
|
Post by ImMeSoHi on Oct 9, 2008 8:05:23 GMT -8
weird..my forum is loading fine now...and the server status is still busy, but forum is loading fine. o.O odd But keep up the good work staff
|
|
inherit
128065
0
Jun 4, 2009 9:24:22 GMT -8
Lakers
4
July 2008
la
|
Post by Lakers on Oct 9, 2008 8:05:42 GMT -8
I made it through on 104 just need 86
|
|
inherit
124890
0
Nov 1, 2012 13:51:01 GMT -8
CLAIRE
66
May 2008
claire001
|
Post by CLAIRE on Oct 9, 2008 8:05:43 GMT -8
its so annoying...does anyone know when it will be fixed?
|
|
inherit
80744
0
Jul 30, 2020 4:42:38 GMT -8
Sam
504
June 2006
sheffieldbus
|
Post by Sam on Oct 9, 2008 8:05:49 GMT -8
My forums on servers 67,75 & 107 are now all back up and running and running the fastest that they have done all afternoon!
Ta, Sam
|
|
inherit
71337
0
Sept 16, 2021 16:47:32 GMT -8
Zath
aka Salma or Ardbeg :
2,607
February 2006
sexysalma
|
Post by Zath on Oct 9, 2008 8:05:51 GMT -8
question: how come this forum is working? If your able to at least get into your headers and footers like I am, then I suggest backing your headers/footers up. This is unnecessary. A denial of service attack clogs up access with constant attempts at connection or pings etc, its not actually an attempt to destroy data.
|
|
inherit
93315
0
Oct 20, 2008 14:02:09 GMT -8
lyndaoh
10
November 2006
lyndaoh
|
Post by lyndaoh on Oct 9, 2008 8:05:54 GMT -8
Weird. When I try to log into mine it brings me back here.
|
|
VD
New Member
Posts: 46
inherit
100039
0
Mar 9, 2012 1:59:16 GMT -8
VD
46
March 2007
vinced99
|
Post by VD on Oct 9, 2008 8:06:02 GMT -8
Only 2 servers offline, the rest all busy. Looking good.
|
|
Megs
New Member
Posts: 2
inherit
127938
0
Oct 10, 2008 23:46:04 GMT -8
Megs
2
July 2008
megs03
|
Post by Megs on Oct 9, 2008 8:06:26 GMT -8
My site is currently up and running
|
|
inherit
132133
0
Jul 30, 2009 9:21:34 GMT -8
littlelouie11
28
October 2008
littlelouie11
|
Post by littlelouie11 on Oct 9, 2008 8:07:04 GMT -8
looks like server 91 is working fine, our site is back up... thanks guys
|
|
inherit
12045
0
Nov 19, 2012 14:52:05 GMT -8
Renegade
As unique as mice pudding milkshake
40,557
August 2003
renegade
|
Post by Renegade on Oct 9, 2008 8:07:13 GMT -8
according to pat's update it was one forum being targeted and steps were being taken to fix things - so i'd guess they moved that board somewhere else or something, to allow other forums to load ok.
|
|
inherit
80744
0
Jul 30, 2020 4:42:38 GMT -8
Sam
504
June 2006
sheffieldbus
|
Post by Sam on Oct 9, 2008 8:07:31 GMT -8
My site is currently up and running Yeah, same here too . Ta, Sam
|
|
inherit
132076
0
Jun 6, 2017 19:09:13 GMT -8
goodolboy
5
October 2008
goodolboy
|
Post by goodolboy on Oct 9, 2008 8:07:34 GMT -8
My site is currently up and running mine too
|
|
inherit
30812
0
Oct 9, 2008 8:32:05 GMT -8
number9
29
September 2004
number9
|
Post by number9 on Oct 9, 2008 8:08:25 GMT -8
My forum is really slow and then loads "page cannot be displayed. status is busy, but don't really know what that means. Forum board 44.
|
|
Dance Harmony
New Member
Dance isn't just something I do. It's who I am.
Posts: 20
inherit
132154
0
Jun 4, 2011 12:16:09 GMT -8
Dance Harmony
Dance isn't just something I do. It's who I am.
20
October 2008
dancexharmony
|
Post by Dance Harmony on Oct 9, 2008 8:08:26 GMT -8
For those of you who haven't clicked on links, Here's the Wiki description of what a DDoS attack is:
A distributed denial of service attack (DDoS) occurs when multiple compromised systems flood the bandwidth or resources of a targeted system, usually one or more web servers. These systems are compromised by attackers using a variety of methods.
Malware can carry DDoS attack mechanisms; one of the more well known examples of this was MyDoom. Its DoS mechanism was triggered on a specific date and time. This type of DDoS involved hardcoding the target IP address prior to release of the malware and no further interaction was necessary to launch the attack.
A system may also be compromised with a trojan, allowing the attacker to download a zombie agent (or the trojan may contain one). Attackers can also break into systems using automated tools that exploit flaws in programs that listen for connections from remote hosts. This scenario primarily concerns systems acting as servers on the web.
Stacheldraht is a classic example of a DDoS tool. It utilizes a layered structure where the attacker uses a client program to connect to handlers, which are compromised systems that issue commands to the zombie agents, which in turn facilitate the DDoS attack. Agents are compromised via the handlers by the attacker, using automated routines to exploit vulnerabilities in programs that accept remote connections running on the targeted remote hosts. Each handler can control up to a thousand agents.[11]
These collections of compromised systems are known as botnets. DDoS tools like stacheldraht still use classic DoS attack methods centered around IP spoofing and amplification like smurf attacks and fraggle attacks (these are also known as bandwidth consumption attacks). SYN floods (also known as resource starvation attacks) may also be used. Newer tools can use DNS servers for DoS purposes. (see next section)
Unlike MyDoom's DDoS mechanism, botnets can be turned against any IP address. Script kiddies use them to deny the availability of well known websites to legitimate users.[1] More sophisticated attackers use DDoS tools for the purposes of extortion — even against their business rivals.[12]
It is important to note the difference between a DDoS and DoS attack. If an attacker mounts a smurf attack from a single host it would be classified as a DoS attack. In fact, any attack against availability would be classed as a Denial of Service attack. On the other hand, if an attacker uses a thousand zombie systems to simultaneously launch smurf attacks against a remote host, this would be classified as a DDoS attack.
The major advantages to an attacker of using a distributed denial-of-service attack are that multiple machines can generate more attack traffic than one machine, multiple attack machines are harder to turn off than one attack machine, and that the behavior of each attack machine can be stealthier, making it harder to track down and shut down. These attacker advantages cause challenges for defense mechanisms. For example, merely purchasing more incoming bandwidth than the current volume of the attack might not help, because the attacker might be able to simply add more attack machines.
Although most DDoS attacks are malicious in nature, the same technique can be used to aid the Internet community. Internet fraud schemes, such as Nigerian 419 scams or phishing, commonly involve fraudulent websites that either impersonate a real website for purposes of stealing the victim's identity, or lend credibility to a scammer's fictional business venture to lure the victim into a false sense of confidence. Scam baiters, who combat these scams by posing as victims for the purpose of wasting the scammer's time and money and obtaining information that can be used by authorities, will forward sites they encounter during the course of their conversations to groups that specialize in site-killing.[citation needed] The group will first try to have a site taken down by informing the host of said site that the site is being used fraudulently. In the case where that approach fails, the group will organize a "takedown" of the site by encouraging its members to visit the site en masse and continually refresh its content (an intentional form of the Slashdot effect sometimes referred to as flash mobbing, although that term is technically reserved for real-world gatherings). Alternately, some groups have special web pages that link to images hosted by these fake sites and show the images to visitors (usually members or supporters of the site-killing group) while constantly reloading them, which is known as intentional bandwidth hogging.[citation needed] The purpose, similar to malicious DoS attacks, is to (a.) rapidly consume all of the website's allocated monthly bandwidth, after which requests for the site's content are refused, (b.) draw the attention of the site's host, who when faced with the constant onslaught on the entire hosting network's resources, will usually remove the site, and/or (c.) take up all available connections and maximum throughput of the host so that would-be victims cannot access the site.
Hope that helps!
|
|
inherit
131015
0
Mar 31, 2011 23:54:53 GMT -8
timothy
20
September 2008
timothy
|
Post by timothy on Oct 9, 2008 8:08:42 GMT -8
We have identified the forum that is the target of this attack. We are continuing to work to minimize the impact of this attack on our services. Oh that means that a forum specifically si beig attacked? Why? Which? Who? It's awful Well it seems to be that my forum is npow working quite fine (106) thank you!
|
|