true
sometimes we get lucky and some contry mainly the us manages with a
lot of mucking about over several years of looking round to close one
botnet down, however they only seem to go after the majorly serious
ones, so sertainly going after these bad guys is quite resource hungry.
I think one of the worst was on last year when several dns previders
were infected with a virus and others were rerouted, eventually these
were shut down but the colateral was huge on those that were
connected, sertainly they had to be disinfected/ reformatted first
and well, resources really don't justify going after these guys
unless they really become a problem.
Its like all the flies we have true you could kill all the flies but
you would never get them all so its something you have to handle, the
net and its badnesses like any world its got its evil side needs to
be controled.
And software that says it will happily nuke all the evil is just
kidding itself.
And even if it does there is a tradeoff.
I once had a security system I worked on that was a combo of 3 bits
of software.
It said it would kill everything evil.
It didn't ocur to the author to define what was though and the
software thought of itself as good and everything evil.
After a lot of junk I had to take down and reformat 10 networked
machines, their backup drives etc.
wasn't worth it at all.
At 07:59 AM 3/25/2013, you wrote:
Dark,
It's not really vandals. It's the botnet guys, and they don't care
one whit about mudding or audio games or anything else. All they're
trying to do is get machines that they can add to their botnet.
The basic idea is that the bad guys get a huge number of computers
under central control, then they use those machines to send spam or to
generate advertising clicks to make money. That's all they want -
machines they can use to generate money via various kinds of spam.
They're parasites, and it sucks a lot - but there's no easy way to get
rid of them, and all we can do is stand up to the constant assault.
The way that I handle it is via security domains, so that different
machines run things that are more risky. A good example of this would
be the AA wiki server, which is on a separate machine because it's a
PHP based and probably hackable. If one machine is compromised, it
doesn't necessarily affect the rest of the network, and you can keep
everything up.
Dennis Towne
Alter Aeon MUD
http://www.alteraeon.com
On Sun, Mar 24, 2013 at 10:09 AM, dark <[email protected]> wrote:
> Wow, that's even scummier than I thought, some people are just naturally
> vandals.
>
> one thing I do wonder however, is how games like Alteraeon, cor exiles,
> kingdom of laothing etc stay up. Perhaps, it would be worth having words
> with dentin, the Ce dev (I can pass on her mail if you like), and some of
> the other developers of accessible multiplayer online games about their
> security arrangements since it would be a bloody massive shame if such
> attacks did! indeed ruine things, and this is not the first I've heard of
> this sort of thing in the accessible games community, since audiogames.net
> fell victim to a very nasty hack a couple of years ago and was offline for
> about amonth (luckily we do back stuff up).
>
>
> Beware the Grue!
>
> Dark.
---
Gamers mailing list __ [email protected]
If you want to leave the list, send E-mail to [email protected].
You can make changes or update your subscription via the web, at
http://audyssey.org/mailman/listinfo/gamers_audyssey.org.
All messages are archived and can be searched and read at
http://www.mail-archive.com/[email protected].
If you have any questions or concerns regarding the management of the list,
please send E-mail to [email protected].
---
Gamers mailing list __ [email protected]
If you want to leave the list, send E-mail to [email protected].
You can make changes or update your subscription via the web, at
http://audyssey.org/mailman/listinfo/gamers_audyssey.org.
All messages are archived and can be searched and read at
http://www.mail-archive.com/[email protected].
If you have any questions or concerns regarding the management of the list,
please send E-mail to [email protected].