Friday, August 07, 2009

What We Did Without Twitter and Facebook...

Yesterday, two of the most popular internet behemoths - Twitter and Facebook - went down as the result of a Distributed Denial of Service (DDoS) attack. It's not uncommon by any means, and isn't overly malicious since personal information like credit card or social security numbers aren't being stolen, or anything along those lines. Rather, the websites are simply bombarded with page hits and the servers can't handle the upsurge in traffic.

As Wired describes, the DDoS attacks were "carried out using a zombie army of infected Windows computers known as a botnet, where the controller tells the infected computers what site to bombard with requests".

The only thing new about this was the popularity of the two targeted sites. While might experience these attacks pretty often, yesterday was the first encounter many ordinary people may have had with the frustration that a DDoS attack brings.

So what did we all do without Twitter and Facebook for the day? Here's a list in the Metro I came across while drinking my morning coffee...

  1. Awkwardly refused the friendship of an acquaintance in person.

  2. Thought outside the box and write a daring 145 characters.

  3. Called CNN's Rick Sanchez constantly to weigh in on health care and Sotomayor.

  4. Discovered a long, hard, and forgotten object in our pants. Turned out it was a pencil.

  5. Googled the term "narcissism".


At 11:47 AM, Blogger Ben Oksman said...

This comment has been removed by the author.

At 11:48 AM, Blogger Ben Oksman said...

As director of technology at my firm, i would love to be able to look-up if any of the DDoS zombies are coming from one of my ip addresses. Would be great if investigators could post the ips to an online database for any major attack. i know some spoofing is involved but i am sure in some cases the IPs are resolved correctly. Do you think this is possible or reasonable?

At 11:57 AM, Blogger Robert J. Domanski said...

That is a great question, Ben. The only method I know is to implement egress filtering to monitor spoofed IP addresses leaving your network.

Read up on how to do this at:

At 12:21 AM, Anonymous BearDutch said...

"Count the New York Jets among the NFL teams that have fully embraced Twitter. The Jets are encouraging players to tweet and recently hired a social-networking intern to help players with their updates. Matt Higgins, the team's senior vice president of business operations, told "I think our fans find it interesting that [kicker] Jay Feely's 8-year-old daughter finds it weird he takes naps."

Social-Networking Position! That is the doom of the next generation,lol. Mom," Get off twitter you been up all night". Son, "But Mom I need to do this, I am practicing for my job as Social-Networking Liaison for the New York Jets".

At 12:06 PM, Blogger Robert J. Domanski said...

Would you rather be the Twitter advisor to NFL players, or actually run the Facebook Fan Page of your favorite NFL team?

My vote would be for the latter :-)


Post a Comment

<< Home