|
||||||||||
|
||||||||||
This is an archive site only. It is no longer maintained.
You can not post comments. You can not make an account. Your email
will not be read. Please read this
page if you have questions. |
||||||||||
I have drawn the short straw this week, and for the next 6.5 days it will be my responsibility to montior this site's "backend" functions. Part of this duty includes reviewing things known as "server logs", and some of the things I have found in these "logs" are quite alarming.
|
|||
As you are probably not aware (since the only means of verifying what I am about to disclose would be to violate our Terms of Service), Adequacy.org offers up its content to our readers through a highly advanced and extremely proprietary system. Part of this system involves a top secret method of determining how our various users are accessing the site (so that we may better tailor our content to you, of course).
Without boring you with the technical details of this unique, closed-source scheme, I will say that it involves a function known as "hardware handshaking" which reveals the exact system configuration our readers use through the use of "cookies" (or "biscuits") which are stored in a remote "database", commonly referred to as a "spreadsheet". In other words, unlike most websites, we know exactly what you are doing here at all times. These "data centers" are typically in an encrypted binary format, just like our web pages, but our advanced software provides a means for making this stream of data "human readable" by printing it out in a low level compiled language called "pearl". It was through this clear, concise, and logical display that I unearthed an ongoing and vicious "hacker" attack. Now it is true that Adequacy.org is constantly under attack from many many people. These devious miscreants frequently pound our site with "spiders" and "robots" in order to take down our server in what is known as a "DDoS" (Destructive Demand of Services). We are prepared for them, however, and routinely block access from these sites so that any newcomer arriving from a "search engine" will not have problems loading our pages. Blocking spiders and robots like "googlebot", "Opera", and "Konqueror" is relatively easy though since they typically only request a dozen or two pages in a month. We can deal with this threat. What we may not be able to fend off is a particular attack I just discovered, one which our very competent and closely gaurded software system identified as having a "browser type" of: manually shorting the pins on an Ethernet cableSeeing this sent a chill down my spine. I almost can not believe that someone would enact such a brutal attack on a Beacon of Truth like Adequacy.org. This person has attempted to "short" our "ethernet pins" (also known as "fry our motherboard") 1,329 times in the past 4 months! We simply can not stand up to this sort of attack for much longer!
In closing, not only do I plead with you people to stop "hacking" our site, but I also must remind you that doing so is in strict violation of our Terms of Service). We do not take this sort of thing lightly, and if you continue these acts you will be prosecuted under the full provisions of the DMCA and the recently passed PATRIOT act. |