bobby177
Member
+129|6930|Texas.. getting out asap
WASHINGTON - Hackers briefly overwhelmed at least three of the 13 computers that help manage global computer traffic Tuesday in one of the most significant attacks against the Internet since 2002.


Experts said the unusually powerful attacks lasted as long as 12 hours but passed largely unnoticed by most computer users, a testament to the resiliency of the Internet. Behind the scenes, computer scientists worldwide raced to cope with enormous volumes of data that threatened to saturate some of the Internet's most vital pipelines.

The
Homeland Security Department confirmed it was monitoring what it called "anomalous" Internet traffic.

"There is no credible intelligence to suggest an imminent threat to the homeland or our computing systems at this time," the department said in a statement.

The motive for the attacks was unclear, said Duane Wessels, a researcher at the Cooperative Association for Internet Data Analysis at the San Diego Supercomputing Center. "Maybe to show off or just be disruptive; it doesn't seem to be extortion or anything like that," Wessels said.

Other experts said the hackers appeared to disguise their origin, but vast amounts of rogue data in the attacks were traced to
South Korea.

The attacks appeared to target UltraDNS, the company that operates servers managing traffic for Web sites ending in "org" and some other suffixes, experts said. Officials with NeuStar Inc., which owns UltraDNS, confirmed only that it had observed an unusual increase in traffic.

Among the targeted "root" servers that manage global Internet traffic were ones operated by the Defense Department and the Internet's primary oversight body.

"There was what appears to be some form of attack during the night hours here in California and into the morning," said John Crain, chief technical officer for the Internet Corporation for Assigned Names and Numbers. He said the attack was continuing and so was the hunt for its origin.

"I don't think anybody has the full picture," Crain said. "We're looking at the data."

Crain said Tuesday's attack was less serious than attacks against the same 13 "root" servers in October 2002 because technology innovations in recent years have increasingly distributed their workloads to other computers around the globe.



http://news.yahoo.com/s/ap/20070207/ap_ … NlYwN0bQ--
LT.Victim
Member
+1,175|7019|British Columbia, Canada
...

I thought Gibson was the name of the BF2s Server?

So your saying bf2s got hacked?  Wouldn't be the first time.. lol
Agent_Dung_Bomb
Member
+302|7192|Salt Lake City

And they must have done it with laptops in the train station. 
bobby177
Member
+129|6930|Texas.. getting out asap

LT.Victim wrote:

...

I thought Gibson was the name of the BF2s Server?

So your saying bf2s got hacked?  Wouldn't be the first time.. lol
you must not have seen the movie hackers lol
LT.Victim
Member
+1,175|7019|British Columbia, Canada

bobby177 wrote:

LT.Victim wrote:

...

I thought Gibson was the name of the BF2s Server?

So your saying bf2s got hacked?  Wouldn't be the first time.. lol
you must not have seen the movie hackers lol
I Guess not..

But Wiki shall teach me

http://en.wikipedia.org/wiki/Hackers_%28movie%29
too_money2007
Member
+145|6764|Keller, Tx
Did they get into my garbage file? Them bastards!!1
Ajax_the_Great1
Dropped on request
+206|7103
Those nerdy bastards.
Kmar
Truth is my Bitch
+5,695|7057|132 and Bush

Hacking myths

1. Code does not move
In films and television code is always sailing across the screen at incredible speeds; it's presented as an indecipherable stream of letters and numbers that make perfect sense to the programmer but dumbfound everyone else.  I understand that to the non-savvy person the abilities of a programmer might seem amazingly complex, but do they honestly think we can read shit that isn't sitting still?  It'd be like trying to read six newspapers flying around in a tornado.    Sure, I can watch a kernel compile, tail a log file, or simply monitor the scrolling output of a program - but the most value I get out of those activities is when execution stops and I can actually scroll back to read what the hell happened (unless the output was going slow enough I could read it as it happened).

2. Code is not green text on a black background
Sure, code can be green text on a black background if you want it to, but most programmers use syntax highlighting and sysadmins configure their shell to use ANSI color.

3. Code has structure
According to the movies all programmers abhor the space bar and enter key.  In the real world code has structure - it's got line breaks, spacing, and indentation.  Granted, we've all written our share of unreadable hacks: I used to write a lot of perl and I had a knack for writing nasty regular expressions that moved many of my successors to committing seppuku, but those days are over.  It's all about clarity now.

4. Code is not three dimensional
Remember in "hackers" when the gibson is depicted as a three dimensional city that the hackers must navigate through? Bullshit! We may use a dash of color in our shell to make things a bit clearer, but last I checked my terminal app doesn't require OpenGL.   I'm working here, bitches - I'm not playing quake.

5. Code does not make blip noises as it appears on the screen
This goes for ANY text, not just code.   When text appears on my monitor it doesn't make blip sounds - this isn't 1902 (or whenever monitors used to do that).
This is one of the most common offenses in Hollywood films, almost every movie that has a scene where a character is composing an email or surfing the net has the text make blippity-blip sounds as it appears.  Do they have any idea how fucking irritating that would be in real life?    This article alone would be like thirty thousand blippity-blips.

6. Code cannot be cracked by an 8 year old kid in a matter of seconds
Sorry, no.  Just no. 

7. Not all code is meant to be cracked
Hollywood loves to endorse the notion that programming, encryption, and complex computing in general are all the same thing: a jumble of secretive data that must be broken by a seriously (srsly!) clever hacker.  This is somewhat understandable because the term "code" itself is ambigious.  In the realm of computing, code typically has two definitions:

   1. The symbolic arrangement of instructions that a computer can understand - like "Your PHP code is shit"
   2. The disguised transformation of a message - "The Navajo code talkers in WWII"

Hollywood usually applies #2 to all of a programmer's computing activities.  There are no windows to drag, no enclosing brackets or IF statements, there's no desktop.  Everything on the computer takes the form of an encrypted message, which must make looking at hot steamy pr0n a real bitch (md5 makes me flaccid).

8. Code isn't just 0100110 010101 10100 011
Sure, when you get down to the binary level it's a bunch of 1's and 0's, but who does that?  I've never met anyone who codes binary.
Hey Hollywood directors: programmers use this neat thing called the ALPHABET.  It's got letters that you put together to form words.  We even put spaces between those words (see #3). 

Also, the whole joke about everything on a computer being just a bunch of 1's and 0's has become painfully not funny.  It ranks right up there with the joke about the user who uses his cdrom tray as a cupholder, I'm pretty sure I'd heard that joke a thousand times by 1997.   Just because all data on a computer is ultimately represented by one or a zero doesn't mean that the basis behind it is as simple as a one or a zero.  That's like saying all humanity ultimately boils down to a bunch of carbon atoms (or whatever the hell we're made of), so the next time someone steals my car I can laugh it off and say "Oh those silly carbon atoms!"

9. People who write code use mice
According to Hollywood most programmers haven't discovered how to use a mouse.   Sure, we type fast, but a mouse is a very useful tool and there's no reason we'd abandon it.  While we're dispelling stereotypes, I'd also like to say that not all programmers are hot-pocket eating virgins who play WoW.  Some of us exercise and have active social lives.  Some have even had SEX! Holy Crap!

10. Most code is not inherently cross platform
Remember in Independence Day when whatshisface-math-guy writes a virus that works on both his apple laptop AND an alien mothership?  Bullshit!
If real life were like film I'd be able to port wordpress to my toaster using a cat5 cable and a bag of glitter.
Xbone Stormsurgezz
liquidat0r
wtf.
+2,223|7083|UK

LT.Victim wrote:

...

I thought Gibson was the name of the BF2s Server?

So your saying bf2s got hacked?  Wouldn't be the first time.. lol
BF2s has never been hacked. It has simply had its moderators' passwords guessed.
Bertster7
Confused Pothead
+1,101|7037|SE London

Kmarion wrote:

If real life were like film I'd be able to port wordpress to my toaster using a cat5 cable and a bag of glitter.
I quite liked the hacking in Matrix Reloaded, it looked fairly realistic, apart from the mind boggling speed they ran nmap at (but they're in a giant computer program, they can explain away any anomalies like that easy).

Most hacking in films does make me laugh though.
dead_rac00n
Member
+12|6938|DTC

liquidat0r wrote:

LT.Victim wrote:

...

I thought Gibson was the name of the BF2s Server?

So your saying bf2s got hacked?  Wouldn't be the first time.. lol
BF2s has never been hacked. It has simply had its moderators' passwords guessed.
And a MAJOR april fool, last year
Stingray24
Proud member of the vast right-wing conspiracy
+1,060|6901|The Land of Scott Walker

liquidat0r wrote:

LT.Victim wrote:

...

I thought Gibson was the name of the BF2s Server?

So your saying bf2s got hacked?  Wouldn't be the first time.. lol
BF2s has never been hacked. It has simply had its moderators' passwords guessed.
You guys have to quit using 1337 as your password.
liquidat0r
wtf.
+2,223|7083|UK

dead_rac00n wrote:

liquidat0r wrote:

LT.Victim wrote:

...

I thought Gibson was the name of the BF2s Server?

So your saying bf2s got hacked?  Wouldn't be the first time.. lol
BF2s has never been hacked. It has simply had its moderators' passwords guessed.
And a MAJOR april fool, last year
Well yes, but that was the owner of the site hacking his own site. I don't think that counts.

Board footer

Privacy Policy - © 2025 Jeff Minard