GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   attn: Reality Check Network (https://gfy.com/showthread.php?t=992770)

Nautilus 10-16-2010 06:26 PM

Quote:

Originally Posted by DirtyWhiteBoy (Post 17614177)
Imagine how worried they would have to be if they actually paid for all of those videos. :1orglaugh

:1orglaugh:1orglaugh:1orglaugh

Yep no worries for them. Even if they have to start from scratch, their uploaders will get everything back in no time.

Machete_ 10-16-2010 06:39 PM

Quote:

Originally Posted by DirtyWhiteBoy (Post 17614162)
Gonna start calling you Bad Ass Brad. If you would do that for another company, it speaks volumes of how excellent your own support is. :2 cents:

Nigga please. It's a PR stunt to woo the resident sheep and possibly lure the current RCN clients in.

Get real, no one is flying any techs anywhere.

pentae 10-16-2010 06:45 PM

Like, Whoa.

rhizome 10-16-2010 06:53 PM

Shit, fml

BIGTYMER 10-16-2010 06:58 PM

Quote:

Originally Posted by KlenTelaris (Post 17614035)
If i am not wrong dns update can be drastically speed up if you set very low TTL in your dns records.

Yes, you're right. Thats why I always use a low TTL and hosted DNS. DNSMadeEasy.com is awesome!

epitome 10-16-2010 07:12 PM

To those that are saying they should have one flip backup hosts and all of that other BS.

Stop trolling.

These companies are not Bank of America.

This has happened exactly once. One or two days of down time costs a lot less than redundant hosting.

Get real. Off-site backups is all you need. If things go past 48 hours then they can look into having another company bring them back up from a backup.

By the sounds of it I've experienced more downtime with Gmail and Facebook than RCN customers. If those companies can survive it, RCN customers can.

Perspective, people, perspective.

directfiesta 10-16-2010 07:24 PM

Quote:

Originally Posted by KlenTelaris (Post 17614035)
If i am not wrong dns update can be drastically speed up if you set very low TTL in your dns records.

You are correct ... once propagated, you set them back to a default value.

Agent 488 10-16-2010 07:25 PM

http://www.aarongleeman.com/uploaded...unk-730344.JPG

Alprazolam 10-16-2010 07:26 PM

Did you guys backtrace the hacker?
Feel free to leave that cocksuckers xvideos.com site down as long as possible.

Brad Mitchell 10-16-2010 07:31 PM

Quote:

Originally Posted by Machete_ (Post 17614202)
Nigga please. It's a PR stunt to woo the resident sheep and possibly lure the current RCN clients in.

Get real, no one is flying any techs anywhere.

Hey, quote this, its rare for me!


Fuck you, asshole. I dare you to say that to my face as I have been boxing for nine months.

While you may have no character or respect for others, that doesn't give you the right to judge mine. PR stunts are for pussies with time on their hands. I leave more business in my inbox due to time constraints than most competitors have altogether.

That said, while I myself would never expect a similar offer if I was in that situation, I can imagine their horror and sympathize enough with the problem and its implications where yes, I would drop things to help.

I might not be the richest guy in the room but I work hard, sleep well at night.. and have tremendous karma from a lot of good deeds.

Brad

P.S. - I advised an RCN customer earlier to wait it out rather than me whore it out - by their own admission, stellar service for years already. If I knew the owner, I would have called already to ask in person and off the boards.

willwank 10-16-2010 08:02 PM

Quote:

Originally Posted by Brad Mitchell (Post 17614281)

as I have been boxing for nine months.

I LOL'd :1orglaugh

RBC 10-16-2010 08:08 PM

Quote:

Originally Posted by - LOL - (Post 17613752)
message from RCN for those who are affedted:


and my email is down:disgust

SNRProductions 10-16-2010 08:16 PM

Quote:

Originally Posted by epitome (Post 17614248)
To those that are saying they should have one flip backup hosts and all of that other BS.

Stop trolling.

These companies are not Bank of America.

This has happened exactly once. One or two days of down time costs a lot less than redundant hosting.

Get real. Off-site backups is all you need. If things go past 48 hours then they can look into having another company bring them back up from a backup.

By the sounds of it I've experienced more downtime with Gmail and Facebook than RCN customers. If those companies can survive it, RCN customers can.

Perspective, people, perspective.

well put.

Brad Mitchell 10-16-2010 08:21 PM

Quote:

Originally Posted by SNRProductions (Post 17614335)
well put.

Very well put!

Brad

papill0n 10-16-2010 08:39 PM

should have used a usb stick

Klen 10-16-2010 09:27 PM

Quote:

Originally Posted by Brad Mitchell (Post 17614281)
Hey, quote this, its rare for me!


Fuck you, asshole. I dare you to say that to my face as I have been boxing for nine months.

While you may have no character or respect for others, that doesn't give you the right to judge mine. PR stunts are for pussies with time on their hands. I leave more business in my inbox due to time constraints than most competitors have altogether.

That said, while I myself would never expect a similar offer if I was in that situation, I can imagine their horror and sympathize enough with the problem and its implications where yes, I would drop things to help.

I might not be the richest guy in the room but I work hard, sleep well at night.. and have tremendous karma from a lot of good deeds.

Brad

P.S. - I advised an RCN customer earlier to wait it out rather than me whore it out - by their own admission, stellar service for years already. If I knew the owner, I would have called already to ask in person and off the boards.

What means boxing?You didn't said fuck off to anyone for nine months? :)

cosis 10-16-2010 10:48 PM

wake me when its back

tonyparra 10-17-2010 12:09 AM

Quote:

Originally Posted by Domain Broker (Post 17612943)
so every server suffered from the same vulnerability, or

every server had the same global administrator account/password, or

rogue employee.

which one is it?

whoops :Oh crap

Abracadabra_nl 10-17-2010 12:49 AM

I am very much against the death penalty... But hackers..... Aaaaargh!
I would like to make an exception for them! ;)

Roald 10-17-2010 12:50 AM

So whats the status now, I see Pichunter is back up.

Abracadabra_nl 10-17-2010 12:52 AM

Quote:

Originally Posted by Roald (Post 17614580)
So whats the status now, I see Pichunter is back up.

They have been up like this for more than 12 hours. But the thumbs don't show up

Roald 10-17-2010 12:54 AM

Quote:

Originally Posted by Abracadabra_nl (Post 17614581)
They have been up like this for more than 12 hours. But the thumbs don't show up

Oops was too fast, saw it loading and thought they were up.

My bad.

Soo which paysite programs are affected? I would like to put their links on backup till all is fixed for obvious reasons.

Andy22 10-17-2010 12:56 AM

gl getting it sorted. im on a small server there but luckily dont have any big income producing sites anymore. RCN have been good over the years though, i hope they get this shit fixed.

sandman! 10-17-2010 01:14 AM

your an idiot.


Quote:

Originally Posted by Tippy (Post 17613954)
I'm seeing a lot of these sites/domains going nowhere, you should set something up and redirect your domains. Seems crazy to just leave your sites/domains dead for this amount of time.

Just wanted to add, as mentioned, do you think its a good idea to host a legit site on a server hosting illegal tubes, seems risky these days considering.


sandman! 10-17-2010 01:17 AM

if rcn was located near brad im sure he would lend a hand not all hosting companies work like vultures.


Quote:

Originally Posted by Machete_ (Post 17614202)
Nigga please. It's a PR stunt to woo the resident sheep and possibly lure the current RCN clients in.

Get real, no one is flying any techs anywhere.


Matyko 10-17-2010 01:40 AM

Quote:

Originally Posted by Jdoughs (Post 17613688)
I'd rep you but I can't. Solid offer.

+1 :pimp

Abbie 10-17-2010 01:40 AM

Quote:

Originally Posted by Roald (Post 17614587)
Oops was too fast, saw it loading and thought they were up.

My bad.

Soo which paysite programs are affected? I would like to put their links on backup till all is fixed for obvious reasons.

Here's a starting place: http://serversiders.com/as46652

madawgz 10-17-2010 01:50 AM

guys at rcn must be so stressed :\

tg989 10-17-2010 02:01 AM

One logical explanation is the following:

Somebody got ahold of the root ssh key, likely an ex employee or current employee.

They logged into all the machines, changed the root pass/keys or replaced the ssh server with a custom one and then systematically disabled apache/lighttpd/nginx/mysql/pgsql etc (you'll notice that the sites running apache show forbidden but the ones that were running lighttpd just time out), then they gave rcn an ultimatum, effectively holding them hostage for a calculated sum of money (somebody who knows what is at stake, again, likely an employee/ex-employee). They probably also had the insight to make sure backups were affected as this really don't seem like a heat-of-the-moment thing. This is premeditated. The servers are still online, they are still 'running' the dns is still working... nothing was 'corrupted' or trashed, RCN just doesn't have access any more, holding them in a tight position as the servers are spread out in multiple locations and they don't have anyone 'infront' of them to use the console or do mass operating system re-installs+backup recoveries.

This is the only situation that really makes sense, there is NO gain to be made from hacking RCN and deleting everything. There is always motive involved, almost always monetary. As such, I assume somebody is doing this for financial gain and they are likely holding it hostage until they get the money, which if it is a wire, would be quite a few days. :\ I know of a registrar that was in a very similar situation recently. This registrar was being ddosed by a disgruntled ex-customer who had their domains deleted or blocked and they basically kept ddossing the domain servers until the registrar finally gave in.

I really don't want this to turn into an epass drama thread/situation and incite pandemonium or mass exodus, but this is really the most probable situation as it stands now.

:2 cents:

Abracadabra_nl 10-17-2010 02:34 AM

Quote:

Originally Posted by tg989 (Post 17614685)
I really don't want this to turn into an epass drama thread/situation and incite pandemonium or mass exodus, but this is really the most probable situation as it stands now.

:2 cents:

Well, isn't this what you are doing right now? :winkwink:

carrion1928 10-17-2010 02:55 AM

Quote:

Originally Posted by tg989 (Post 17614685)
One logical explanation is the following:

Somebody got ahold of the root ssh key, likely an ex employee or current employee.

They logged into all the machines, changed the root pass/keys or replaced the ssh server with a custom one and then systematically disabled apache/lighttpd/nginx/mysql/pgsql etc (you'll notice that the sites running apache show forbidden but the ones that were running lighttpd just time out), then they gave rcn an ultimatum, effectively holding them hostage for a calculated sum of money (somebody who knows what is at stake, again, likely an employee/ex-employee). They probably also had the insight to make sure backups were affected as this really don't seem like a heat-of-the-moment thing. This is premeditated. The servers are still online, they are still 'running' the dns is still working... nothing was 'corrupted' or trashed, RCN just doesn't have access any more, holding them in a tight position as the servers are spread out in multiple locations and they don't have anyone 'infront' of them to use the console or do mass operating system re-installs+backup recoveries.

This is the only situation that really makes sense, there is NO gain to be made from hacking RCN and deleting everything. There is always motive involved, almost always monetary. As such, I assume somebody is doing this for financial gain and they are likely holding it hostage until they get the money, which if it is a wire, would be quite a few days. :\ I know of a registrar that was in a very similar situation recently. This registrar was being ddosed by a disgruntled ex-customer who had their domains deleted or blocked and they basically kept ddossing the domain servers until the registrar finally gave in.

I really don't want this to turn into an epass drama thread/situation and incite pandemonium or mass exodus, but this is really the most probable situation as it stands now.

:2 cents:

A DDOS is clearly not what's happening here and is a TOTALLY different situation.

No one is holding anything hostage. A common phrase in the networking world is there's no security without physical security. In other words, if you can access a box, you can't lock someone out of it. A company hosting as many large sites as RCN has physical access to the machine, either personally, or through their data center. You can reset the root password of a box in 5 minutes if you can actually get to it. So unless you're implying that their data centers are literally being held hostage, IE: with guns, then your just fear mongering.

Also, anger and revenge are plenty of motive. In fact, their some of the best motives and pretty damn common. It's definitely possible (even likely) that the hacker is a current or ex employee, though.

Tippy 10-17-2010 04:05 AM

Quote:

Originally Posted by sandman! (Post 17614605)
your an idiot.

Because... ? Dude you can do better then that can't you, elaborate on it.

Mike

Denny 10-17-2010 04:09 AM

many big sites are still down, that really sucks :Oh crap

b2kill 10-17-2010 05:18 AM

Last news from them:

"We are still in progress on restoring data and connectivity, we'll update you with more details as soon as possible."

:disgust

tg989 10-17-2010 05:49 AM

Quote:

Originally Posted by carrion1928 (Post 17614746)
A DDOS is clearly not what's happening here and is a TOTALLY different situation.

No one is holding anything hostage. A common phrase in the networking world is there's no security without physical security. In other words, if you can access a box, you can't lock someone out of it. A company hosting as many large sites as RCN has physical access to the machine, either personally, or through their data center. You can reset the root password of a box in 5 minutes if you can actually get to it. So unless you're implying that their data centers are literally being held hostage, IE: with guns, then your just fear mongering.

Also, anger and revenge are plenty of motive. In fact, their some of the best motives and pretty damn common. It's definitely possible (even likely) that the hacker is a current or ex employee, though.

If they could just boot into a shell and reset the root password for all the boxes in only 5 minutes then we'd be out of this already, wouldn't we?

I would be very surprised to see if this wasn't about money, somewhere along the line of motives.

Also, just to clarify, I wasn't implying that this was due to a ddos, just that the same effect would be achieved, a controllable lapse of service that somebody could use as leverage. Anyway, sure would be good to get a proper update with some details to put some worries to rest.

OneWhoKnows 10-17-2010 06:26 AM

Quote:

Originally Posted by tg989 (Post 17614685)
This is the only situation that really makes sense, there is NO gain to be made from hacking RCN and deleting everything. There is always motive involved...

Hmmm... Well, traffic on my biggest tube (legal, of course) increased by 7k overnight. Plus I'm making some mad sales during the last 1 1/2 days. And I hear the same from other webmasters and program owners.

Might just be a coincidence, but I definitely see some motives here. :winkwink:

AdultKing 10-17-2010 06:35 AM

I wonder when someone will claim responsibility.

These sites have been down for a while, but seriously, you'd expect RCN to be able to put a short explanation on their website which is now just 403 Forbidden.

I wonder if some security guys will be looking for a new job Monday ?

dodgeman 10-17-2010 06:37 AM

My traffic incrased, too.

Trax 10-17-2010 07:07 AM

with sales and traffic up i wouldnt mind xvideos staying down
screw them

CaptainHowdy 10-17-2010 08:07 AM

"I get up, I get downnnnnn..."


All times are GMT -7. The time now is 01:30 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc