Krazy Kats

A friendly informal discussion forum: Talk about anything from birth to death - and beyond!

[solved] Photobucket

Share
avatar
Kitkat
Admin

Female

Posts : 3203
Points : 11364
Join date : 2011-03-19
Location : Around the bend
Star sign : Sagittarius
Chinese zodiac : Dragon

SOLVED [solved] Photobucket

Post by Kitkat on Tue 26 Apr 2016 - 12:55

Photobucket had some sort of service maintenance procedure yesterday which apparently messed all sorts of sites all over the net.  Any forums, blogs, FB pages etc that use Photobucket for their imaging were riddled with big 'OOPS' boxes all over the place where the image should appear.  Nightmare! 
See link: http://www.isitdownrightnow.com/photobucket.com.html#commentstop.

Seems to be OK for us now, but I hope this situation didn't put anyone off using and enjoying the forums.
If it happens again, you can be assured that it's just a temporary thing that happens now and again with Photobucket (once in a blue moon really) and doesn't seem to cause any permanent damage to our sites.


Last edited by Kitkat on Fri 21 Oct 2016 - 21:24; edited 1 time in total
avatar
Kitkat
Admin

Female

Posts : 3203
Points : 11364
Join date : 2011-03-19
Location : Around the bend
Star sign : Sagittarius
Chinese zodiac : Dragon

SOLVED Re: [solved] Photobucket

Post by Kitkat on Tue 18 Oct 2016 - 11:14

update 

I think Photobucket might be doing one of their server maintenance schedules again (as above) - because all the Photobucket pics on the Forum at the moment are not showing, just the url's that are showing without the images.

Last time I got rid of all the empty url's because I thought it was a permanent thing, but they all came back after a couple of hours, so I had to go through it all replacing the pics again that I had deleted (some of them I couldn't remember what they had been) - so this time I will leave them as they are, in anticipation of them automatically being replaced when their maintenance has completed.

So, if you have put up images anywhere on the Forum which you think you have lost - I would suggest don't worry for the moment and don't do anything and let's see if it rectifies itself in a while.

Obviously, if after a full day we still don't have our images back, then I will have to make some changes, but hopefully that won't be the case.
avatar
Kitkat
Admin

Female

Posts : 3203
Points : 11364
Join date : 2011-03-19
Location : Around the bend
Star sign : Sagittarius
Chinese zodiac : Dragon

SOLVED Re: [solved] Photobucket

Post by Kitkat on Fri 21 Oct 2016 - 21:21

Widespread continuing problems with Photobucket.  Messing up the Forum as well as loads of others.
According to this link, people have been experiencing these problems throughout the last 24 hours:  http://downdetector.com/status/photobucket


update -  Photobucket's problems might have something to do with this: (headline in today's News)

Cyber attacks briefly knock out top sites


Twitter, Spotify, Reddit, Soundcloud, PayPal and several other sites have been affected by three web attacks.

All the firms are customers of a company called Dyn, which they use to help users find their sites online.
In quick succession on Friday, Dyn was swamped by two attacks that made the sites of its customers hard to reach.

It is not clear who is behind the attack or why Dyn has been hit. The FBI and US Department of Homeland Security said they were investigating.

Reddit, Twitter, Etsy, Github, Soundcloud, Spotify and many others were all reported as being hard to reach by users throughout the attack, which lasted about two hours.

Access to sites such as the New York Times, Paypal, Pinterest and Tumblr, as well as some cable firms, was also reported as being intermittent.


In a statement on its website, Dyn posted information about the incidents and said it had been subjected to Distributed Denial of Service (DDoS) attacks.

These attempt to overwhelm servers by bombarding them with huge amounts of data.

The first DDoS attack started early on Friday morning in the US and mostly affected more in the east of the country. The initial impact of the attack made some sites harder to reach as queries sent to locate them took longer to process.

Paypal said the web attacks "prevented some of our customers from being able to pay with PayPal in certain regions. PayPal was not attacked directly, nor were any of our core services to business impacted in the disruption".

In a message posted to Twitter, and widely shared, Github said a "global event" was affecting Dyn, which had made its site hard to reach.

A second attack started later on Friday, which Dyn said used the same tactics as the first. A similar list of Dyn customers became harder to visit as a result of the attack.

Soon after the second attack was reported, the Department of Homeland Security said it was looking into "all possible causes" of the attacks on Dyn.

The incidents mark a change in tactics as DDoS attacks are more typically aimed at a single site. Dyn acts as a directory service for huge numbers of firms, which helps customers keep global address books up to date with the location of their domains.

Richard Meeus, from security company NSFocus, said the attack showed how critical domain directory services were to the running of the net and how that they had often been "neglected" security-wise.

"It is treated as if it will always be there in the same way that water comes out of the tap and electricity is there when you switch it on," he said.

more   http://www.bbc.co.uk/news/technology-37728015
avatar
Kitkat
Admin

Female

Posts : 3203
Points : 11364
Join date : 2011-03-19
Location : Around the bend
Star sign : Sagittarius
Chinese zodiac : Dragon

SOLVED Re: [solved] Photobucket

Post by Kitkat on Tue 25 Oct 2016 - 13:33

As per link in the Shoutbox:  http://www.bbc.co.uk/news/technology-37738823

Further info on the above:

Mirai malware simplifies internet attacks like last week's


A massive internet attack that paralyzed Twitter, Netflix and other services is being blamed on a specific kind of malware designed to harness the power of ordinary consumer devices. The bad news: Using it isn't particularly hard and doesn't require much money. The malware, known as Mirai, was recently posted online for others to adapt for their own attacks.


October 24, 2016

Researchers say Mirai exploited security vulnerabilities in thousands of internet-connected devices such as web cameras, then used those devices to attack a major internet firm, resulting in widespread outages. Researchers say Mirai has been used before, but not on the scale of Friday's attacks.

Here's a look at Mirai and what makes it so destructive.

WHAT HAPPENED?

Dyn Inc., an internet company in Manchester, New Hampshire, said its servers were hit by a distributed denial-of-service attack. These types of attacks work by overwhelming targeted computers with junk traffic, so legitimate traffic can't get through.

Jason Read, founder of the internet performance monitoring firm CloudHarmony, said his company tracked a half-hour-long disruption early Friday affecting access to many popular sites from the East Coast. A second attack later in the day spread disruption to the West Coast as well as some users in Europe.

WHAT MADE THIS ATTACK SO NASTY?

While distributed denial-of-service attacks have been around for years, hackers have many more devices they can use to pull off their attacks, thanks to the proliferation of internet-connected cameras, thermostats, lights and more.

And Mirai makes it easy for a would-be attacker to scan the internet for devices to take over and turn into "botnets" for launching coordinated attacks, Chris Carlson of the cybersecurity firm Qualys said.

While botnets have been used as weapons for nearly a decade, they have typically been employed by organized crime groups that targeted websites involved in less-than-savory businesses such as pornography or gambling. Those sites pay extortion money to make the problem go away quietly, Carlson said.

"But when you bring it to Dyn, and a lot of the internet gets shut down, people take notice," Carlson said.

WHAT KINDS OF DEVICES WERE AFFECTED?

Researchers at the cybersecurity firm Flashpoint say very few devices in the U.S. seem to be involved.

Most of the junk traffic heaped on Dyn came from internet-connected cameras and video-recording devices that had components made by an obscure Chinese company. Those components had little security protection, so devices they went into became easy to exploit.

Because the components were put into a variety of devices that were then packaged and rebranded, it's hard to tell exactly where they ended up. But Flashpoint researchers Allison Nixon and Zach Wikholm say their research shows that the bulk of them ended up in Vietnam, Brazil, Turkey, Taiwan and China.

WHO'S BEHIND IT?

That remains unclear. Nixon and Wikholm say it's unlikely that this is a state-sponsored attack. Because the blueprints, or source code, for Mirai were public, an attack like this wouldn't need a government's resources.

Hacker groups have claimed responsibility through Twitter, but those claims haven't been verified and the pair says it's likely that they're all lying.

"These guys are amateurs and they managed to get this far. That's kind of scary," Nixon said.

ARE MORE ATTACKS COMING?

Probably. Hacker groups have threatened targets ranging from the Russian government to major corporations and the U.S. presidential election. But it's unclear if those groups are actually capable, or just making empty threats.

Experts say that whatever the target, more attacks are inevitable in light of the continued growth of connected devices and the lack of security requirements for them. Therefore, the solution lies in boosting device security at the hardware level.

"At the end of the day, these attacks aren't super sophisticated," Carlson says. "They're just a blunt hammer and whoever has the biggest hammer wins."

The Department of Homeland Security said Monday that it's been working on security practices for internet-connected gadgets and will release them in the common weeks.

Follow Bree Fowler at https://twitter.com/APBreeFowler . Her work can be found at http://bigstory.ap.org/author/bree-fowler .

    Current date/time is Wed 26 Jul 2017 - 23:37