• Welcome! The TrekBBS is the number one place to chat about Star Trek with like-minded fans.
    If you are not already a member then please register an account and join in the discussion!

Map of cyber attacks

farmkid

Commodore
Commodore
A website has published a real-time map of cyber attacks as they happen. First of all, it's fascinating to watch what's going on on line. As you sit and stare at it, every so often you'll see a mass of attacks all directed at one location, perhaps coming from one location or from all over the world. Like this:
cyberattack3.jpg


It usually looks more like this:
cyberattack1.jpg


I have to wonder, though, how does this website get the information it's displaying? Or are they just making it up?
 
Most large data centers have folks who monitor internet traffic and watch for attacks on the local company network with commercial software. Also, there are internet appliances you stick not only inside your network, but in your DMZ that have really cool interfaces like this one to monitor what's coming into your network from the outside internet.

The software at that site would have to be powerful (not to mention their actual computing power) to do this real time. I'm sure it exists, you know damn well our government has this stuff, and it's probably much better.
 
That is way too cool! I mean, not the attacks, but the monitoring software. That is awesome.
 
That is way too cool! I mean, not the attacks, but the monitoring software. That is awesome.

Yea it is. It's one good way of keeping an eye on those SOB's.

Ran into some issues with Echtel before on my laptop -_-. VERY annoying they are.
 
That is way too cool! I mean, not the attacks, but the monitoring software. That is awesome.

Yea it is. It's one good way of keeping an eye on those SOB's.

Ran into some issues with Echtel before on my laptop -_-. VERY annoying they are.

You may not be able to counter - hack a password hacker or data miner that hacks into networks to steal passwords....but you can leave behind nasty little psychological counter-hacks in the form of passwords.

One such password would be "Imgettinintoyourheadagain", or "Stillhacking", "Iknowwhereyougotoschool", "Icanseeyourreflectioninthemirrorasyouaredriving", "Iknowyourtaxicabsroute", etc. that are passive by theirself but when sifted through by hackers selling the data will be like a trip wire across the path that causes a grenade to go off.
 
Last edited:
Network Working Group R. Vida, Ed.
Request for Comments: 3810 L. Costa, Ed.
Updates: 2710 LIP6
Category: Standards Track June 2004


Multicast Listener Discovery Version 2 (MLDv2) for IPv6

Status of this Memo

This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (2004).

Abstract

This document updates RFC 2710, and it specifies Version 2 of the
Multicast Listener Discovery Protocol (MLDv2). MLD is used by an
IPv6 router to discover the presence of multicast listeners on
directly attached links, and to discover which multicast addresses
are of interest to those neighboring nodes. MLDv2 is designed to be
interoperable with MLDv1. MLDv2 adds the ability for a node to
report interest in listening to packets with a particular multicast
address only from specific source addresses or from all sources
except for specific source addresses.


Basically a Remote Monitoring Program that is using technology to record all screen activities as if the other person was sitting in the same room with me watching my monitor?
 
If you are not already a member then please register an account and join in the discussion!

Sign up / Register


Back
Top