This July 17th marks the eleventh anniversary of the famous internet crash. How did the internet crash; the network which was designed to withstand all sorts of catastrophe; even the nuclear warhead crashed?

Internet was designed to be decentralized self governance network using its vast network of machines and root servers. No one controls the system and no one decides where to start looking for a particular domain name. All the IP address to readable domain name information was stored in root servers situated around the globe. Each root server keep the replica of the latest mapping information and serves as needed.

One single human error triggered from the network solutions Inc brought the whole internet to its heels during an early July 17th morning. Database corruption occurred at the network solutions server was ignored by one of its employee causing the corrupted database to get updated in other root servers situated around the world. As a result even though all servers were up and running and none of the domain names were resolved. No one could reach the websites intended.

Soon the backup of the database was restored bring back the system alive after much chaos.

Read more:

Explore More

What are the phases of malicious hacking?

The following are the phases of malicious hacking: 1. Reconnaissance: In this phase, the attacker gathers information about the victim. 2. Scanning: In this phase, the attacker begins to probe

XP Registry tricks

Display Your Quick Launch ToolbarTip: Is your Quick Launch toolbar missing from the taskbar?To display your familiar Quick Launch toolbar:Right-click an empty area on the taskbar, click Toolbars, and then

Website of meteorologist U Tun Lwin hacked

Chiang Mai (Mizzima) – A Burmese hacker group that targets popular Burmese websites broke into the  Myanmar Climate Change Watch (MCCW) website created by noted meteorologist Dr. Tun Lwin. The