• Anything ‘published’ on the web is viewed as intellectual property and, regardless of whether it displays a copyright symbol or not, is therefore copyrighted by the originator. The only exception to this is if there is a “free and unrestricted reuse” statement associated with the work.

    In order to protect our members and TFL from possible litigation, all members must abide by the following new rules:

    1. Copying and pasting entire articles from another site to TFL is strictly prohibited. The same applies to articles from print or other media, and to posting photographs taken of copyrighted pages or other media.

    2. Copyright law provides for “fair use” of portions of a copyrighted work. You can copy no more than a SINGLE paragraph from the article to your post (3 or 4 sentences at most).

    3. You must provide a link to the article along with the name of website. For example: ww.xxx.yyy/zzz (The Lower Thumbsuck Daily News).

    4. You must provide, in your own words, a brief summary of the article AND your reasons for believing it will be of interest to TFL members. Failure to do so may result in the thread being closed or your post being deleted as a “cut and paste drive by.”

    5. Photographs and other images are also copyrighted. "Hotlinking" of images (so that it appears in your message) from other sites is also prohibited unless you own rights to the image. If you wish to share an image, provide a clickable link to it.

    Posts that do not follow these new guidelines will be altered or deleted by staff. Members who continue to violate this policy may lose their posting privileges at TFL.

    Thank you for your cooperation and your participation in TFL, the leading online forum for firearms enthusiasts.

THR is down right now...again

Status
Not open for further replies.
Originally Posted by The "Biker"
Oh, I just snuck across the fence. I figure if I hang around long enough, they'll just grant me amnesty in the form of a Guest Poster bill. Heh heh...

Don't forget to pay all applicable fees. :cool:
 
TFL was portscanned this morning from the webserver of a well-known, vocal, and sometimes tasteless liberal
That seems fishy---Does this happen often?
Maybe the perp is casing the joint to see how to strike here.
 
If you can figure out the physical location of the machines which are currently attacking, perhapse the address could be posted so that an unidentified individual could swing by with some bolt cutters and fix the problem?

it doesn't really matter if the sys admin won't return phonecalls
 
I wonder if mirroring THR/APS would ameliorate the problem, or if that would leave the second server equally likely to fail...
 
Forgot how to do quotes, but Oleg's post noting:

I wonder if mirroring THR/APS would ameliorate the problem, or if that would leave the second server equally likely to fail...

Really good question--I'd like to see a computer geek or two answer that question...no offense to TFL, but my fingers automatically type THR now.
 
Skynet? Yikes!

I saw those Terminator movies. Never thought that Skynet is real :eek:

OBTW, I was unable to open 1911Forum just now.

Does that @#$!*& NYC mayor have "attack geeks" on his staff?

Bart Noir
 
I don't think multiple servers will solve much, it'll just provide more targets. The best solution is to stop the offending traffic, either by blocking it in some manner, getting the server(s) to ignore it, or actually stopping it at the source (breaking fingers, disconnecting systems, etc).

Chris
 
TFL was portscanned this morning from the webserver of a well-known, vocal, and sometimes tasteless liberal 501(c)(3), but as it wasn't really an attack and I don't want lynch mobs forming, I'm not going to identify it.

So where will I put all the rope?

Seriously though, the only way we can win is by taking the high road (or if you will, taking it back).

Since revenge attacks aren't exactly justified, would you please post the IP (or PM me, as I can't really do anything about it).
 
Since our geeks have given tutorials on everything else, could someone explain "portscanning?"

Thanks,

fistful, not Scapegoat
 
He has been... missing since the new servers from here were delivered.

Hopefully, this site can help. Apparently, they've come across problems of this type before.

Either the owners of those sites have never seen the movies, or they have zero sense of humor about it.
 
You can often find a lot out about a target machine by scanning its TCP ports; depending on how well the machine is secured. Different applications and operating systems "listen" on different port #'s. If ports X, Y, and Z are open on a target machine, then you could conclude it's running Application A or B. Attackers do this to find vulnerabilities, customize attacks, etc. Scanning just means they're checking each port to see if it's open and listening for traffic.
 
Last edited:
Status
Not open for further replies.
Back
Top