YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

Internet Survives Major “Zombie” Botnet Assault

Posted On 08 Feb 2007
By : admin

CYBERSPACE — Did the internet seem a little sluggish and listless on Tuesday? If so, it wasn’t just you, it wasn’t your operating system, it wasn’t your connection method, and it wasn’t your computer choking — it was the internet itself.According to industry experts, at least three of the 13 computers that provide the backbone of support for the world wide traffic stream that makes up the internet fell victim to what is being called “one of the most significant attacks against the internet since 2002” by some media sources.

The crack attack lasted for up to 12 hours, during which tech wizards scrambled to redirect and process packets attempting to make their way around the planet. Their work ensured that the majority of online resource users didn’t notice much, if anything.

Although the reason for the attack, which employed infected “zombie” computers, is still unknown, researcher Duane Wessels, of the Cooperative Association for Internet Data Analysis at the San Diego Supercomputing Center observed that “it doesn’t seem to be extortion or anything like that.”

Although the system crackers seem to have been keen to confuse people about their locations, a great deal of suspect traffic involved in the assault was traced to South Korea. Given the use of the highjacked “zombie” computer force, the location of the actual Denial of Service masterminds is unknown.

UltraDNS, which is responsible for operating a number of servers that manage .org domain websites, appears to have been the primary target of the attack, although UltraDNS’s parent company, NeuStar Inc., has only confirmed that it received an unusually large amount of traffic yesterday. Additionally, servers operated by the Defense Department were among those fending off hostile approaches. The Department of Homeland Security has confirmed that its cybersecurity forces have observed “anomalous” traffic.

“The nature of the traffic has not been confirmed,” DHS representative Russ Knocke told the Associated Press, “and the servers, which are overseas, remain operational.” Further, Knocke assured Americans that “There are no indications of any direct nexus to the United States at this time. Also, there is no credible intelligence to suggest an imminent threat to the homeland or our computing systems at this time.”

John Crain, chief technical officer for the Internet Corporation for Assigned Names and Numbers (ICANN) said that the attack is still in force, as is the search for those responsible. “I don’t think anybody has the full picture,” he told the AP. “We’re looking at the data.”

In spite of the scope of this attack, IT insiders agree that it has thus far been less serious than the October 2002 assault that targeted the same 13 “root” servers. The reason for this is said to be the international redistribution of workloads possible due to technological advances in recent years.

While this is good news, senior technology consultant at London-based Sophos, Graham Cluley, wants computer users to realize that info request bombardments such as that experienced yesterday and, to a lesser extent, today, “could have brought the Web to its knees, and while the resilience of the root servers should be commended, more needs to be done to tackle the root of the problem — the lax attitude of some users toward IT security.”

  • google-share
Previous Story

Bottom Falls Out of Japanese Pantyhose Market

Next Story

California State Capital Seeks Sex Toy Free Retail Zones

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • RIVCash
    Live Cam Affiliate Programs
  • Remedy Cash
    Paysite Affiliate Programs
  • Eldorado Trading Company
    Novelty & Lingerie Distributors
  • Premiere Listing

    Mail Value Profits

    More Details

RECENT

POPULAR

COMMENTS

Addis Fouche & Richelle Ryan Spill Oral Sex Secrets on EBaum's World

Posted On 04 Jul 2025

Emma Rose Guests on "In The Tub" Podcast

Posted On 04 Jul 2025

Cubam Star Eva Maxim Enjoys a Hot, New Scene with White Rhino

Posted On 04 Jul 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Sex Toy Collective Dildo Sculptor

Posted On 19 Mar 2019

Find a good sex toy is now a problem,...

Posted On 18 Mar 2024

Thanks to the variety of sex toys, I can...

Posted On 02 Feb 2024

I understand the concerns about...

Posted On 05 Jan 2024

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy