Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "denial of service"
-
Who has a DDOS attack story they want to share ? Dyn put up the good fight today... DDOS attacks can be incredibly difficult to deal with ... Internet of Things devices makes this an even more complicated situation. Outside of calling Prolexic, any vets have some good stories ?6
-
Old unused military satellite to make international calls free. Local tv station to leak episodes. 4500 hosts zombie net with autoreplicant bots that scans for vulnerability to populate the net to do distributed denial of service attacks. Jumper on the neighborhood cabin to redirect the school's call for being absent, an older friend pretended to be my father.
-
Oooh I have quite a few,
My favourite: accidently left a log. Debug("bollocks") in a try catch this made it through testing and does (still) occasionally go into production log files.
Worst: wrote an interceptor for jboss with the intent of checking cache for some lookup data. I picked the wrong one of two similarly named methods and instead queried the database, I effectively wrote a denial of service utility into our app -
I once had to write an http interceptor for a distributed api. The interceptor needed to use the request context and the user profile to work out if a particular type of content had previously been accessed. Anyway there were two methods to get the user profile getUserC and getUserD, turns out C stood for cache D stood for database. Of course I called getUserD I effectively wrote a database distributed denial of service tool into our app 😬 we got a call from our customer complaining that their exadata servers where grinding to a complete halt2
-
Title: Unveiling Deception
For months, I had sensed something off with Jordan. Little things added up—a late-night text, an unexplained absence, and the subtle changes in his demeanor. It gnawed at me, a whisper of doubt that refused to fade. After wrestling with my suspicions, I decided to take action.
I turned to private-hackers dot com a service I had heard about through a friend. Their reputation for discreet investigations gave me a sliver of hope. After a quick consultation, I felt reassured that they could help me uncover the truth without alerting Jordan.
The hackers began their work, diving into the digital footprints Jordan had left behind. They accessed his social media accounts and examined his communications, all while maintaining the utmost discretion. The waiting was agonizing, but I knew I needed clarity.
A few days later, I received an encrypted report. My heart raced as I opened it, revealing a web of messages between Jordan and someone I didn’t recognize. The tone was intimate, filled with inside jokes and plans that made my stomach churn. My worst fears were confirmed.
With this evidence in hand, I confronted Jordan. I laid out the findings from the investigation, his face paling as the truth sank in. The denial melted away as he realized I had proof of his betrayal. It was painful to watch, but I felt a sense of liberation. I had taken control of my situation and uncovered the truth.
In the aftermath, I reflected on the experience. It was a hard lesson learned about trust and the lengths one might go to protect their heart. With the help of those skilled investigators, I found the closure I needed, allowing me to move forward, stronger and wiser. google or email support @private-hackers dot com to hire a professional to unveil your deception.1
