Six months after web traffic involving popular US sites and email from computers around the globe was re-directed to Chinese servers unnecessarily, internet watchers are trying to figure out why it happened and how to prevent future mishaps.
In at least two instances since mid-March, large amounts of traffic on the internet have been routed to China in circumstances still shrouded in mystery, Rodney Joffe, senior technologist at DNS (domain name system) registry Neustar, told CNET News in an interview this week.
The first situation happened on 24 March, when workers at network operation centers in various parts of the world noticed that traffic to popular sites like Facebook, Twitter, YouTube, and about 20 or 30 others was being redirected to servers in China as a result of traffic interception via one of the main DNS root servers. This had the result of giving web surfers in western countries a glimpse of what Chinese internet users see when they try to access sites that are blocked — error messages indicating that the sites don't exist or censored Chinese-language versions of the sites. It's unknown how long the situation lasted, according to Joffe.
Joffe would not name the companies whose traffic was diverted through China, but said it was a "large number of well-known organizations," including many departments of the U.S. government and almost every Fortune 500 in the U.S. Traffic originating near or in the Asia Pacific region had a higher chance of going through China.
He said he could not explain exactly what happened or why. "I have no visibility into what China did," Joffe said.
And he said he believes there were more instances of Web traffic being diverted to China, or "hijacked," around that time, but wouldn't elaborate. "I believe it happened more than twice," Joffe said. "I can't comment on how many times because the information is not generally public.
Tuesday, October 12, 2010
Subscribe to:
Post Comments (Atom)
Popular Posts
-
H i All, In comparison to the logical structure, which performs administrative tasks, the Active Directory physical structure checks when ...
-
Hi All, guess who is this guy ? He is Jonathan James born in 1983 December 12 turned out to be the worlds most threatening and biggest...
-
Hi All, Most of the hackers are using this tool for finding vulnerablities in the network.Mostly the penetrating tester are using this t...
-
Hi All, HACK your friend's keyboard and make him type "You are a FOOL" simultaneously: First open a note pad and copy the ...
-
Hi All, Want to have a look at the tools which Jester (the one who did a Ddos distributed denial of service) attack against Wikileaks ? j...
-
Hi All, If you are using Internet Explorer, Outlook or any Application, you can get Dr .Watson Postmortem Debugger error. You can also obse...
-
Hi All, In computer storage devices are devided in to 2 types . Those are 1. primary storage devices . 2. secondary storage devices. ...
-
Hi All, Navigating Google search results with keyboard keys is a long awaited feature. Shortcuts will save your time and speed up your wo...
-
Hi All, This list offers hundreds of operating system product and project names, many of them are based on the same operating system more ...
Followers
Disclaimer
All Data and Information Provided on This BLOG is only for Education purposes only.If you done any thing else these in real time the blog is not Responsible.Try all those on your own risk.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.
IF you find any thing else here as per in violation of copyright law .mail me on srinathceh@gmail.com as soon as possible action will be taken.
No comments:
Post a Comment