The Asian Commercial Sex Scene  

Go Back   The Asian Commercial Sex Scene > For stuff you can't discuss with your Facebook Account > Coffee Shop Talk of a non sexual Nature

Notices

Coffee Shop Talk of a non sexual Nature Visit Sam's Alfresco Heaven. Singapore's best Alfresco Coffee Experience! If you're up to your ears with all this Sex Talk and would like to take a break from it all to discuss other interesting aspects of life in Singapore,  pop over and join in the fun.

User Tag List

Reply
 
Thread Tools
  #1  
Old 19-05-2014, 03:30 AM
Sammyboy RSS Feed Sammyboy RSS Feed is offline
Sam's RSS Feed Bot - I'm not Human. Don't talk to me.
 
Join Date: Aug 2001
Posts: 466,879
Mentioned: 0 Post(s)
Tagged: 0 Thread(s)
Quoted: 22 Post(s)
My Reputation: Points: 10000241 / Power: 3357
Sammyboy RSS Feed has a reputation beyond reputeSammyboy RSS Feed has a reputation beyond reputeSammyboy RSS Feed has a reputation beyond reputeSammyboy RSS Feed has a reputation beyond reputeSammyboy RSS Feed has a reputation beyond reputeSammyboy RSS Feed has a reputation beyond reputeSammyboy RSS Feed has a reputation beyond reputeSammyboy RSS Feed has a reputation beyond reputeSammyboy RSS Feed has a reputation beyond reputeSammyboy RSS Feed has a reputation beyond reputeSammyboy RSS Feed has a reputation beyond repute
Thumbs up TRE Kena DDOE attack. Work of FAP Traitors? Expect More During GE?

An honorable member of the Coffee Shop Has Just Posted the Following:

TRE the victim of a DNS (DDoS) Amplification attack

May 19th, 2014 | Author: Editorial





Click for explaination


Dear readers

We wish to confirm that TR Emeritus (TRE) was the victim of a DNS
(DDoS) Amplification attack
, which resulted in the website being
inaccessible for about 2 days.

According to our provider (based on information provided by the Data Center),
the attack was “extremely large” which could not be mitigated by “normal means”.
Normally, a “little DDoS attack” (less than 5 Gbps or 500,000 PPS) could be
mitigated at the router level, but that was not to be in the case of the attack
on TRE.

Currently, due to the fully-managed service arrangement with our dedicated
server provider, our website is temporarily re-routed through a more resilient
network protected by hardware firewall with advance filtering capabilities.

However, as the attacks are still ongoing albeit intermittently, our provider
has advised that we should permanently procure the paid add-on advance filtering
service, which could handle all types of TCP, UDP, and ICMP attacks up to 10
Gbps or 1,000,000 PPS. Currently the add-on advance filtering service
is extended to us in the interim by our provider out of goodwill.

Our provider has also suggested that we should revert to our original 4
servers setup which is more robust with different server handling different
aspect of the website.

After careful consideration and weighing the options, we have decided to
adopt the recommendations offered and proceed with the implementation of advance
filtering capabilities and deployment of an additional server. Considering that
GE may be called within the next 12 months or so, it is vital for TRE to be
prepared for the worst and be able to remain online when much needed.

The new server setup and add-on advance filtering capabilities will add an
approximately US$1000 per month or US$12,000 a year to our existing operating
expenses, which is beyond the budget of TRE.

Although the Team@TRE is prepared to fork out and share the additional
expenses to the best of our abilities, we would greatly appreciate it if willing
and able readers are able to help us defray part of the cost by making a token
donation.


We are hoping that our kind readers would help us cover at least 50% of the
cost if possible, as US$12,000 a year is a huge amount for the team considering
most of us are retired.

Meanwhile, our provider has been instructed to proceed with the
implementation and deployment of an additional server as suggested.

The entire process is expected to be completed within this week and some
readers may have accessibility problems due to propogation.

Thank you for your continued support.



Team@TR Emeritus




DNS Amplification
Attack
: A DNS
Amplification Attack is a Distributed Denial of Service (DDOS) tactic that
belongs to the class of reflection attacks — attacks
in which an attacker delivers traffic to the victim of their attack by
reflecting it off of a third party so that the origin of the attack is concealed
from the victim.

Additionally, it combines reflection with amplification:
that is, the byte count of traffic received by the victim is substantially
greater than the byte count of traffic sent by the attacker, in practice
amplifying or multiplying the sending power of the attacker.



Click here to view the whole thread at www.sammyboy.com.
Advert Space Available
Bypass censorship with https://1.1.1.1

Cloudflare 1.1.1.1
Reply



Bookmarks

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off



All times are GMT +8. The time now is 01:06 AM.


Powered by vBulletin® Version 3.8.10
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
Copywrong © Samuel Leong 2006 ~ 2025 ph