This July 17th marks the eleventh anniversary of the famous internet crash. How did the internet crash; the network which was designed to withstand all sorts of catastrophe; even the nuclear warhead crashed?

Internet was designed to be decentralized self governance network using its vast network of machines and root servers. No one controls the system and no one decides where to start looking for a particular domain name. All the IP address to readable domain name information was stored in root servers situated around the globe. Each root server keep the replica of the latest mapping information and serves as needed.

One single human error triggered from the network solutions Inc brought the whole internet to its heels during an early July 17th morning. Database corruption occurred at the network solutions server was ignored by one of its employee causing the corrupted database to get updated in other root servers situated around the world. As a result even though all servers were up and running and none of the domain names were resolved. No one could reach the websites intended.

Soon the backup of the database was restored bring back the system alive after much chaos.

Read more:

Explore More

TCP/IP Tutorial

This tutorial is intended to supply a brief overview of TCP/IP protocol. Explanations of IP addresses, classes, netmasks, subnetting, and routing are provided, and several example networks are considered. The

Joomla Hack

######################################################################################### Joomla 1.5.x Remote Admin Password Change ########################################################################################## ## Author: d3m0n ([email protected]) ## Greets: GregStar, gorion, d3d!k ## ## Polish “hackers” used this bug to deface turkish sites BUAHAHHA nice

Critical SQL Injection in Yatanarpon Web Portal

PlanetCreator reported another critical SQL injection (vulnerability) on several sites of Yatanarpon Web Portal URL : http://www.yatanarpon.com.mm/ SQL injection is a code injection technique that exploits a security vulnerability occurring