![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 |
Confirmed User
Join Date: Jan 2003
Location: internet
Posts: 4,398
|
Major Internet Attack Could Be Near
Major Internet Attack Could Be Near
by KYW's Bob Bicknell The federal government and Internet security experts are warning about a serious computer flaw that could shut down almost all Internet traffic. There is concern an attack could come as soon as Thursday. For months, Internet security experts have been working in secret, trying to fix a flaw in a core Internet technology. The flaw affects the Internet's transmission control protocol, or "TCP." A hacker armed with the right information could disrupt the devices that control Internet traffic, effectively taking large portions of the global network offline. The governments of the United States and Great Britain issued alerts Tuesday, warning an attack could disrupt Internet service around the world. The flaw was discovered by Wisconsin researcher Paul Watson last year. Watson is expected to present his findings to an Internet security conference on Thursday. He's predicting hackers would understand how to begin launching attacks within minutes of his speech. Right now, there's nothing individual Internet users can do about it. http://kyw1060.com/news_story_detail...wsitemid=37014 Is anyone worried? |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 | |
Looking California
Industry Role:
Join Date: Feb 2001
Posts: 5,476
|
Quote:
Maybe wait until it is fixed before talking about how it is fucked up. ![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 |
Confirmed User
Industry Role:
Join Date: Jul 2003
Location: MetroCity
Posts: 3,181
|
So why is he giving the speech?
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 |
Too lazy to set a custom title
Industry Role:
Join Date: Aug 2002
Posts: 55,372
|
i like how he said "tcp" hes a n00b. like its a new term. maybe he should read the rfc on tcpip. and see if they can stop randomg tcp and udp spoofed attacks. throw that at him. its nothing new, its all the same shit thats been going around. they just have more power.
__________________
Since 1999: 69 Adult Industry awards for Best Hosting Company and professional excellence. ![]() WP Stuff |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 |
Confirmed User
Join Date: Apr 2002
Location: Los Angeles
Posts: 6,102
|
So why's he still giving that speech then? I bet its a critical microsoft vulnerability again
![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 |
Confirmed User
Join Date: Apr 2004
Location: NEW YORK CITY
Posts: 2,274
|
this "vulnerability" is nothing new. its just bruteforcing isn numbers with RST packets.. this is only a problem for applications that are holding tcp connections for hours. this may have been a problem in 1994 when every OS used the 64k rule, but hardly today..
__________________
Make Real Green with ORGANIC SEO | Blog post exchange | Non-index page trades | A-B C-D Trades [icq: 194-215-962] [mail: [email protected]] |
![]() |
![]() ![]() ![]() ![]() ![]() |