Attacks+traffic+resources+filtering

Showing results 1 to 20 of 45

Optus filter to go live this month

Optus has confirmed that it will follow Telstra and start filtering its customers' internet traffic for a blacklist of sites containing child pornography within the next few weeks.

July 3, 2011 by

Telstra's Interpol filter goes live

The nation's largest telco Telstra last night confirmed that it had started filtering its customers' internet traffic, preventing them from accessing a blacklist of sites containing child pornography as compiled by international policing agency Interpol.

July 1, 2011 by

Tough titties: Govt sites stormed

Anonymous, best known for its masked protests against the Church of Scientology, has branched out into denial-of-service attacks against Australian government websites to protest the Rudd Government's plans for mandatory internet "filtering".

February 14, 2010

Hackers target govt over filter

A group of hackers mainly known for their attacks against the Church of Scientology has threatened a widespread web attack starting today against the Federal Government in an attempt to protest its internet filtering initiative.

September 8, 2009 by

Amazon beefs up cloud visibility and monitoring tools

Amazon Web Services rolled out a beta for Elastic Compute Cloud (EC2) tools that will allow for better monitoring and visibility of cloud computing resources. In a blog post (statement), Amazon introduced:Amazon CloudWatch, which tracks and monitors the company's cloud computing service;AutoScaling, which adds and subtracts EC2 capacity based on demand;And Elastic Load Balancing, which will distribute traffic across EC2 computing instances.

May 17, 2009 by

DDoS + Web 2.0 == Buckets o' traffic

Denial of Service attacks are based upon a simple idea: generate the maximum amount of traffic using the minimum amount of work. At one time this was as simple as sending a spoofed ICMP echo packet to a broadcast address or similar shenanigans.

September 5, 2008 by

Test your ISP's net neutrality!

The Electronic Frontier Foundation (EFF) has released a tool, dubbed 'Switzerland' (net neutrality - geddit?), that's designed to help web users check if their ISPs are doing nasty things with traffic filtering, a la Comcast.

August 5, 2008 by

IT Dojo: How to spoof a MAC address

When you support small offices, home offices, and remote offices, you often run across older wireless equipment. Equipment that's likely secured with MAC filtering and perhaps a hidden SSID and WEP encryption.Most techs would agree that MAC filtering alone isn't going to secure a wireless network and that even WEP and a hidden SSID aren't much better. But does MAC filtering at least keep out the lazy hackers? In this IT Dojo video, Bill Detwiler shows you just how easy it is to spoof a MAC address.Once you've watched this IT Dojo video, you can find a link to the original TechRepublic article, print the tip, and get links to additional remote support and administration resources from our IT Dojo Blog.

July 14, 2008 by

Finjan uncovers half a gigabyte of stolen data on crimeware servers

Finjan's Malicious Code Research Center has uncovered a half of gigabyte of stolen data from US Healthcare organizations and from a major airline on crimeware servers in Argentina and Malaysia.A representative of Finjan stated:"Hackers incorporated sophisticated attacks using crimeware toolkits, Trojans, and Command and Control servers to drive traffic from a specific region with specific characteristics.

June 17, 2008 by

Behind the Revision3 attacks

Over the Memorial Day weekend, popular Internet video site Revision3 crashed due to a flood of decoy traffic to its servers. CNET News.com's Kara Tsuboi sits down with Revision3 CEO Jim Louderback, who talks about who was responsible for the denial-of-service attacks and why, and how "old" media and "new" media are going to have to learn to get along.

May 30, 2008 by

Is IT becoming extinct?

Since the days of punch cards, IT has believed itself to be guardian of precious computing resources against attacks from non-technical barbarians known as "users." This arrogant attitude, born of once-practical necessity in the era of early data centers, reflects inability to adapt to present-day realities. Such attitudes, combined with recent technological and social changes, are pushing IT to share the fate of long-extinct dinosaurs.While ITs demise won't happen overnight, the trend is clear. Here's why.

March 23, 2008 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories