Hackers Crackers have attempted to topple key parts of the internet’s backbone, in one of the most significant attacks of recent years. The target was servers that help to direct global internet traffic. In the early hours of Tuesday three key servers were hit by a barrage of data in what is known as a distributed denial-of-service attack. There is no evidence so far of damage, which experts are saying is testament to the robust nature of the internet.
I’m glad you crossed out “hackers” in that summary. These days, I’m so used to seeing the word used in that way, I didn’t even blink.
Nice to know some places still get it right!
I was going to say that too. Correct hacker lingo is important to me, as it isn’t “m4d l33t sp34k!” like most think. Proper hackish lexicon is imaginative, fun and highly creative.
The really sad thing about l33t speak is that (if I’m not mistaken) it was basically a silly “stylistic” fad/affectation that was borrowed from “punk” in the 80s, and has lived on with wannabe-“hackers” long after dying out with the group that originated it.
Although, I do admit thinking that the character name “Da5id” from Snow Crash was sort of clever.
Remember that language is defined by usage, so in todays world, the term ‘Hacker’ actually means what most people think it means.
Well judging by the votes for that post, a lot of people disagree with you.
Besides, what something means is often defined not just by the general public, but also by its usage in a particular field. Watch a psychologist’s reaction if you misuse the word “schizophrenia” for example.
Now if those who use “hacker” in the sense we use “cracker” had another word for OUR sense of “hacker”, that might help. But they don’t have one that fits exactly.
No wonder my internet at home was not working yesterday. I told my roommate to change the dns server on our router, so he changed it from 4.2.2.1 to 4.2.2.2 and it was fine. I figured it was just a fluke.
The articles I read on this implied that the attack didn’t significantly affect users. Three of the root DNS servers (including DoD and ICANN) took the brunt of the attack, and the root DNS system responded quickly by rerouting DNS requests across a widely distributed network of backup servers. The operators of the root DNS system learned a lot from the 2002 attack and have implemented a vastly more resilient architecture.
Curiously, no one has produced any viable theories as to why this attack happened. All they say is that a lot of the traffic came from South Korea. I think that given the moderate size of the attack and the casual response, it’s quite likely that this was an unannounced test of the emergency response capabilities of the root DNS. In other words, with my tin foil hat firmly in place, I think one or more national governments did this on purpose. By all accounts, the system passed the test quite nicely.
why couldn’t they have attacked myspace instead? at least that would have been a HELP to the internet.
LOL! So true.
…to the use of the term “crackers.” The politically-correct terminology would be “honkies” or (no offense to any clowns who may be reading this).
race has nothing to do with this. Your post is pointless.
I have a incredibly strong hunch that was a joke.
how do they know hackers are behind it? sure, its likely, but cant be known
Last time I checked more of the Internet’s big DNS (and BIND) servers were running some variant of Unix.
I think it’s time we question whether Unix is an appropriate platform for the Internet. This is not the first time this has happened, and if we keep using in-secure OSes for critical data then we get what we deserve.
if we keep using in-secure OSes for critical data then we get what we deserve
Certainly. And you propose to use.. what?
Certainly. And you propose to use.. what?
<sarcasm>Vista!!!</sarcasm>
So… let’s see. The DNS insfrastructure didn’t even BLINK because of this DDoS but so unix should be gotten rid of cause it’s not robust enough??? Huh??? Oh, man… I’d like to know what would have happend had it been any of the MS server variants. Had it been on, we would be surfing a cheap porn site when you asked for http://www.google.com!!! :-S
I think it’s time we question whether Unix is an appropriate platform for the Internet. This is not the first time this has happened, and if we keep using in-secure OSes for critical data then we get what we deserve.
You obviously didn’t read the article. Yes, Unix runs most of the Internet. The article clearly points out that this sustained attack was a dismal failure. Yes, highly trained and competent people were involved in keeping it that way, but whatever the platform, you wouldn’t want highly UNtrained and INcompetent people running the ‘Net, would you?
As another poster said, I’d welcome your thoughts on any alternative that would be an improvement.
…I think it’s time we question whether Unix is an appropriate platform for the Internet. …
If this can be construed as an OS problem, then it probably relates to unpatched Windows machines that were being used as zombies.
And where is your evidence?
Please provide links…
Go fix computers for your local community; that will soon open your eyes to the reality of ‘computing’.
http://localhost
wow, you are a bit of a moron. *pats head* It’s ok.
Last time I checked more of the Internet’s big DNS (and BIND) servers were running some variant of Unix.
Um … BIND is a DNS server.
I think it’s time we question whether Unix is an appropriate platform for the Internet. This is not the first time this has happened, and if we keep using in-secure OSes for critical data then we get what we deserve.
Did you read the article? It had nothing to do with the OS that was running. It was a DOS attack. It doesn’t matter what your OS is, if your pipe is full of illegitimate requests, then you’re going to have a hard time servicing legitimate requests.
Um … BIND is a DNS server.
And it’s an outstanding piece of code, too. One of my previous jobs involved using some static analysis software to analyze lots of system code. It’s very picky and produces 50% false positives on a good day.
I was asked to run this tool on some open source code of my choice for comparison, and I happened to choose BIND. This resulted in zero “complaints” from the analysis tool, which I’d never seen happen for anything larger than a few thousand lines of code.
Taking a look, I found that the code is immaculate, highly structured, and defensive to the extreme. Every little function has a block of assertions at the top that list all of the preconditions and a block at the bottom to check the postconditions. It manages its own slab of memory using ultra-robust routines (because malloc just isn’t hardened enough).
I came away with the sense that this is exactly the kind of code I would want running something so important as the Internet. Then I had to get back to work, so I scanned the FreeBSD kernel instead, and found a more usual distribution of bugs and weaknesses.
butters, if you don’t mind please post the name of the tool…
Sorry… I tried to convince them to open it up, claiming that the community would make a damn good frontend (which was sorely lacking), but no luck.
If you participate in an OSS project, please visit http://www.coverity.com — They have the world’s most advanced static analysis tool and provide licenses free of charge to any OSS project. It’s significantly better than the tool I was using, but my attempts to push a licensing deal stalled because they wanted millions of dollars. Various happy OSS users include the Linux kernel, Apache, and FreeBSD, as well as Solaris, Oracle, and many other proprietary customers. It’s based on a research project out of Stanford and has really grown into something special. They can do stuff with static analysis that many previously thought were impossible, such as detecting race conditions and deadlocks.
Time to implement some P2P protocol for vital network parts lol.
And a cracker is a hacker, though a “bad” one. If u feel about mixing those two words, you still have to explain it _every_ time over and over again.
Why do people insist in referring to these people in some specific way, when they are simply criminals?
If they would be referred to as criminals, then *anyone* would have no trouble figuring out their nature, and there would be a better chance that hackers could get back the respect they deserve.