So, last night I had a lot of fun after I was getting a DDOS attack against my server. I had several connections from a few Camfrog relay servers or other related servers which have been causing high bandwidth flow over the past few days. Needless to say, attack averted at least for now.
The internet seems to be such a friendly place, and it is not the only type of attack I receive. Another favourite of mine is attempting to finding openings into my database. Fortunately, that is something else that I have protected. Stop attacking me!!
It’s an exciting time with the web. Linode have just enabled IPv6 networking at their London data-centre, something that I have been waiting for some time now; something to amuse me for this evening.
To experiment, I have enabled this site for IPv6 and hopefully any of you users out there can now enjoy the content of this rarely updated website. It is however unlikely that the new user market opened up by this move will provide access for many as it is the consumer market that now needs to move towards the IPv6 switch-over.
OK, finally got this damn site back online (word-press upgrades gone wrong). So, as a first post back, I thought I would touch on the ePrivacy law coming into effect literally over the next few days. Take a look here: http://www.lintal.co.uk/eprivacy-law-debrief/.
How secure do you think your computer or online data really is? One technique used by hackers to break passwords is so-called “brute force” where they try and guess every single combination for your password and unfortunately this is becoming easier. It is quite common practice now to utilise the processors contained onboard graphics cards to crack these passwords because of their abilities to perform “floating-point” operations rather than the standard CPUs performing integer calculations. This means that if you have a short and simply-formatted password, your accounts could be opened to hackers in a matter of minutes!
So how can you protect yourself here?
Well the first option is to use a more secure password; try and choose something with upper/lower case characters, numbers and symbols to add complexity. You should also be using password lengths of around 12 characters ideally as it becomes exponentially harder to crack with a longer password.
When you are online, always make sure that you know the site that you are using is genuine. Simple test for this is look at the URL in the address bar; so many passwords are found where people create an identically looking login page and capture your data. If you know you are sending sensitive data OR accessing sensitive data, make sure that the site has an approved security certificate and is accessed on https:// .
Now even https connections are under attack too. Because of once again the uses of graphics card processors, these secure connections can be broken in a scarily short amount of time too! For this reason, many companies now demand what are referred to as “one-time-passwords” where these are calculated by some algorithm and are time-dependent. This way, if someone does sniff your “password”, it will not be useable at another time.
Rule of thumb
Secure password. Think what you’re sending. Think where it is being stored is secure. Make sure that you are on the site you intend to be on. Simple!
Recently we have seen many problems from large websites about security flaws at the user level. It is this kind of security loophole that can allow people to access or hijack information that they should not be able to reach. Fortunately the larger organisations have the ability to sort these problems in a short period of time but these could be prevented earlier on in the development process.
Hi everyone. I am aware its been a little while since the last post I put out but the blame for this lays on university finals and a quick holiday. Fortunately I am back on the scene now so keep a lookout for any new posts from me.
As part of expanding this site, I am going to be adding a portfolio of some of the web projects that I have been working on; this way you can see first hand what is out there under my name. Also, I will be adding a couple of pages over time about the photography I do and some of the interesting software tools that I have been using.
Finally, it is my intention to move away from the standard wordpress template on this site and I am beginning discussions with a friend and graphics designer. Unfortunately it seems that people or companies who work on the web always focus on other projects rather than their own websites, but with any luck it will be done in the near future.
Recently we have seen a huge influx of advertisements from Microsoft trying to show off Internet Explorer 8. These adverts, amusingly for those of us who use different browsers, are showing off functionality that has existed in other browsers for a much longer time. The idea of private browsing has existed in all the other main-stream browsers for a long time, parental controls and more.
Now IE9 is on its way and this will apparently support the forthcoming and updated standard, HTML5. I hope this time they get things right and actually support true web-standards, rather than making us developers fight against all the quirks.
These new regulations specify that no intermediary stage may be taken to produce the applications. This includes software or toolkits that convert code from one language into iPhone compatible software. It seems to me that they are trying to push the competition out of the game, just another way in getting money flowing to them directly.