Nu te mai zdrobi degeaba, nu esti singurul care a patit asta, problema este de la dyndns.
Incearca si da manual modify host, sa faca up la IP.
Acum 2 zile mi se futu cu totul. A inghetat imaginea pe sh*ring si de atunci nu mai merge NIMIC pe peer-uri !
Dream 7000 Gemini 3.3 pe Stick , restul functioneaza normal.
Am incercat diferite IMAGE-uri. Am schimbat Flash-ul. Am controlat si actualizat port-urile din Router daca sunt deschise, cu chei intern functioneaza gb*x-ul... totusi in "GB*X Center"- imi arata toate peerurile pe rosu-deci offline.
Interesant este ca pe MgcamD/NewcamD merge sh*ringul perfect, plus ca pot actualiza si downloada via internet cu BLue Panel - CAM-uri Keys, Plugins etc.
Pe unele IMAGE-uri in cind controlez conexiunea in "GB*X Center" cind vreau sa controlez peer-urile un avertisment in care scrie in engleza ca :
ii lipseste fisierul /tmp/onl - sau sa fiu sigur ca gb*x e pornita(ce este) si sa reincerc !
Va rog de ajutor. ARDE! Cine a avut asemnea simptome ?
Originally Posted by http://www.dyndns.com/news/status/
MII DE MULTUMIRI !
S-a rezolvat. Update-ul de Host m-a salvat.
Asa ceva nu mi s-a mai intimplat ...
Exista si leac, sau trebuie as ne asteptam pe viitor la astfel de probleme mereu ?
Cum este cu ceilalti provideri insa : n*-ip.org si h*pto.org ? Au si astia problemele acestea ?
In computer security, a denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Typically the targets are high-profile web servers, and the attack attempts to make the hosted web pages unavailable on the Internet. It is a computer crime that violates the Internet proper use policy as indicated by the Internet Architecture Board (IAB).
DoS attacks have two general forms:
* Force the victim computer(s) to reset or consume its resources such that it can no longer provide its intended service.
* Obstruct the communication media between the intended users and the victim so that they can no longer communicate adequately.
Methods of attacks
A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. Examples include:
* flooding a network, thereby preventing legitimate network traffic;
* disrupting a server by sending more requests than it can possibly handle, thereby preventing access to a service;
* preventing a particular individual from accessing a service;
* disrupting service to a specific system or person.
Attacks can be directed at any network device, including attacks on routing devices and Web, electronic mail, or Domain Name System servers.
A DoS attack can be perpetrated in a number of ways. There are three basic types of attack:
1. consumption of computational resources, such as bandwidth, disk space, or CPU time;
2. disruption of configuration information, such as routing information;
3. disruption of physical network components.
In addition, the US-CERT has provided tips on the manifestations of DoS attacks:
* unusually slow network performance (opening files or accessing web sites)
* unavailability of a particular web site
* inability to access any web site
* dramatic increase in the number of spam emails received
Am avut acum vreo 3 ani de-a face cu un tip din botosani la care i s-a pus pata pe ip-ul meu si ma trezeam cu 2-3 atacuri DOS pe zi. L-am lasat sa-si faca damblaua vreo saptamana, am luat logurile din firewall, le-am trimis la rds botosani, foarte amabili baietii de acolo mi-au multumit si instant a disparut si domeniu si ip-ul din care eram "atacat". Au zis sa le dau de veste daca se mai intampla si vor lua masuri...nu s-a mai intamplat
Police foil UK net attack
Scotland Yard is believed to have uncovered a terr'orist plot to attack one of Europe's largest collocation facilities, which houses a significant amount of telecoms infrastructure and is a main hub for UK internet traffic.
A report in UK newspaper the Sunday Times reveals that UK police discovered computer files during a series of raids last year, disclosing the Telehouse Europe facility in London's Docklands as a potential target for ter'rorist action such as infiltration or bo'mbing.
The suspects have since been arrested but it is reported that "intense reconnaissance" was carried out on the facility, considered to be one of the most secure locations in the UK.
Neither Scotland Yard nor Telehouse will make any comment on the report but major telcos would have alternative routes to keep web traffic moving. However, concerns over ter'rorists being able to bring down significant portions of the internet are not new.
Perhaps the most famous example came in 1998, when representatives from L0pht Heavy Industries hacker and security think tank testified before Congress in the US that they could "shut down the entire internet in 30 minutes."
While such a feat has never been achieved, security experts concede that such threats have to be considered as valid concerns.
Last week, internet authority the Internet Corporation for Assigned Names and Numbers (Icann) released a report on the major attack carried out on the internet's root of DNS servers early in February.
The 13 core DNS servers of the internet were hit with a significant distributed denial of service (DDoS) attack but Icann claims that the internet withstood the attack because of the implementation of Anycast load balancing technology.
Although six of the 13 root servers were affected, the two worst affected did not have Anycast installed.
The Anycast platform allows a number of servers in different places to act as if they are in the same location.
@ Lauri : nu esti singurul care are aceasta problema ! Si la mine a fost doua zile la rand , sa speram ca se va rezolva pana la urma .
There are currently 1 users browsing this thread. (0 members and 1 guests)