RSS iconTwitter iconFacebook icon

The Trek BBS title image

The Trek BBS statistics

Threads: 139,672
Posts: 5,429,648
Members: 24,823
Currently online: 501
Newest member: voyagerman49


Welcome! The Trek BBS is the number one place to chat about Star Trek with like-minded fans. Please login to see our full range of forums as well as the ability to send and receive private messages, track your favourite topics and of course join in the discussions.

If you are a new visitor, join us for free. If you are an existing member please login below. Note: for members who joined under our old messageboard system, please login with your display name not your login name.


Go Back   The Trek BBS > Entertainment & Interests > Science and Technology

Science and Technology "Somewhere, something incredible is waiting to be known." - Carl Sagan.

Reply
 
Thread Tools
Old June 30 2014, 08:37 PM   #1
farmkid
Commodore
 
Map of cyber attacks

A website has published a real-time map of cyber attacks as they happen. First of all, it's fascinating to watch what's going on on line. As you sit and stare at it, every so often you'll see a mass of attacks all directed at one location, perhaps coming from one location or from all over the world. Like this:


It usually looks more like this:


I have to wonder, though, how does this website get the information it's displaying? Or are they just making it up?
__________________
Computers are like the God of the Old Testament: lots of rules and no mercy.
farmkid is offline   Reply With Quote
Old June 30 2014, 08:47 PM   #2
Spider
Dirty Old Man
 
Spider's Avatar
 
Location: Lost in time
Re: Map of cyber attacks

Most large data centers have folks who monitor internet traffic and watch for attacks on the local company network with commercial software. Also, there are internet appliances you stick not only inside your network, but in your DMZ that have really cool interfaces like this one to monitor what's coming into your network from the outside internet.

The software at that site would have to be powerful (not to mention their actual computing power) to do this real time. I'm sure it exists, you know damn well our government has this stuff, and it's probably much better.
__________________
Go and have another beer, Grog Mod. - Orac Zen

spider's new motto: So many Lounge bars, so little time. - DAK

At my age you take what you can get. Or invent. - Mallory
Spider is offline   Reply With Quote
Old July 1 2014, 01:40 PM   #3
Haggis and tatties
Rear Admiral
 
Haggis and tatties's Avatar
 
Location: Glasgow
Re: Map of cyber attacks

Reminds me of War games.
__________________

Haggis and tatties is offline   Reply With Quote
Old July 6 2014, 08:31 PM   #4
publiusr
Commodore
 
Re: Map of cyber attacks

Some other talk of that here http://cosmoquest.org/forum/showthre...e-in-real-time
publiusr is offline   Reply With Quote
Old July 8 2014, 04:24 AM   #5
J. Allen
Science Is Magic™
 
J. Allen's Avatar
 
Location: Equestria
Send a message via ICQ to J. Allen Send a message via AIM to J. Allen Send a message via Windows Live Messenger to J. Allen Send a message via Yahoo to J. Allen
Re: Map of cyber attacks

That is way too cool! I mean, not the attacks, but the monitoring software. That is awesome.
__________________
"I'm Star Swirl the Bearded! Father of the amniomorphic spell?
Did you even read that book I gave you about obscure unicorn history?" - Twilight Sparkle
-=-=-=-=-=-=--=-=-=-=-=-=-=-
Brony Kingdom
J. Allen is offline   Reply With Quote
Old July 11 2014, 02:49 PM   #6
Random_Spock
Fleet Captain
 
Random_Spock's Avatar
 
Location: Random_Spock
View Random_Spock's Twitter Profile
Re: Map of cyber attacks

J. Allen wrote: View Post
That is way too cool! I mean, not the attacks, but the monitoring software. That is awesome.
Yea it is. It's one good way of keeping an eye on those SOB's.

Ran into some issues with Echtel before on my laptop -_-. VERY annoying they are.
__________________
RIP Robin, you'll be missed . Credit goes to Amblin Entertainment and TriStar Pictures for this picture of Robin, no copyright infringement intended.
Random_Spock is offline   Reply With Quote
Old July 25 2014, 12:16 AM   #7
Dryson
Lieutenant Commander
 
Re: Map of cyber attacks

Random_Spock wrote: View Post
J. Allen wrote: View Post
That is way too cool! I mean, not the attacks, but the monitoring software. That is awesome.
Yea it is. It's one good way of keeping an eye on those SOB's.

Ran into some issues with Echtel before on my laptop -_-. VERY annoying they are.
You may not be able to counter - hack a password hacker or data miner that hacks into networks to steal passwords....but you can leave behind nasty little psychological counter-hacks in the form of passwords.

One such password would be "Imgettinintoyourheadagain", or "Stillhacking", "Iknowwhereyougotoschool", "Icanseeyourreflectioninthemirrorasyouaredrivi ng", "Iknowyourtaxicabsroute", etc. that are passive by theirself but when sifted through by hackers selling the data will be like a trip wire across the path that causes a grenade to go off.

Last edited by Dryson; July 25 2014 at 12:28 AM.
Dryson is offline   Reply With Quote
Old July 25 2014, 12:24 AM   #8
Dryson
Lieutenant Commander
 
Re: Map of cyber attacks

Network Working Group R. Vida, Ed.
Request for Comments: 3810 L. Costa, Ed.
Updates: 2710 LIP6
Category: Standards Track June 2004


Multicast Listener Discovery Version 2 (MLDv2) for IPv6

Status of this Memo

This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (2004).

Abstract

This document updates RFC 2710, and it specifies Version 2 of the
Multicast Listener Discovery Protocol (MLDv2). MLD is used by an
IPv6 router to discover the presence of multicast listeners on
directly attached links, and to discover which multicast addresses
are of interest to those neighboring nodes. MLDv2 is designed to be
interoperable with MLDv1. MLDv2 adds the ability for a node to
report interest in listening to packets with a particular multicast
address only from specific source addresses or from all sources
except for specific source addresses.


Basically a Remote Monitoring Program that is using technology to record all screen activities as if the other person was sitting in the same room with me watching my monitor?
Dryson is offline   Reply With Quote
Old July 25 2014, 01:41 AM   #9
Chemahkuu
Vice Admiral
 
Chemahkuu's Avatar
 
Location: United Kingdom
Send a message via Yahoo to Chemahkuu
Re: Map of cyber attacks

__________________
"But there's no sense crying over every mistake. You just keep on trying till you run out of cake."
Chemahkuu is offline   Reply With Quote
Old July 26 2014, 06:33 PM   #10
Rhubarbodendron
Commodore
 
Rhubarbodendron's Avatar
 
Location: milky way, outer spiral arm, Sol 3
Re: Map of cyber attacks

If they added the NSA's activities the screen would explode
__________________
Down with boredom! Post in the Lounges!
Rhubarbodendron is offline   Reply With Quote
Reply

Bookmarks

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump



All times are GMT +1. The time now is 06:41 PM.

Powered by vBulletin® Version 3.8.6
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
FireFox 2+ or Internet Explorer 7+ highly recommended.