For DBAs: "Think of backup strategies as restore strategies"

Posted on July 24th, 2014 by Boyana Peeva in Tech

database administratorAndrew Pruski is an SQL Server DBA currently working for Ding in Dublin, Ireland. He’s previously worked for Occam-DM Ltd and the United Kingdom Hydrographic Office in England. He’s benefitted immensely from the online DBA community, and his blog is an attempt to give something in return.

Aside from the SQL Server, he’s keen on running and playing rugby. He can also play the guitar (badly, but it doesn’t stop him).

Read more...

Facebook suffers global outage

Posted on June 19th, 2014 by Websitepulse in Monitoring, Industry News, Tech

Facebook error message

facebook.com went down for aboutt 15 minutes between 4:00 and 4:15 AM EST. Users trying to connect to the site were seeing an error message "Sorry, something went wrong".  The issue has been confirmed by multiple locations around the world and as far as we can tell all Facebook users were affected.

Read more...

Test Your Server Against the Heartbleed OpenSSL Vulnerability

Posted on April 8th, 2014 by Websitepulse in Tools, Tech

Heartbleed OpenSSL vulnerabilityA major vulnerability in OpenSSL software was announced late yesterday, impacting all servers having the Heartbeat TLS extension enabled with OpenSSL versions states above.

The "heartbleed" vulnerability, has been already recorded as CVE-2014-0160. Further details can be found at heartbleed.com and www.openssl.org/news/secadv_20140407.txt.

The bug has already scared a lot of system administrators and site owners, and the one that we've done on WebSitePulse was to release a test against this vulnerability.

So, if you want to check whether your secure server is affected or not, please visit: www.websitepulse.com/heartbeat.php

Read more...

How to set Up Your Reports Properly

Posted on March 18th, 2014 by Robert Close in Tech

There are several reports that can quickly provide you with information related to the latest events of your targets. 

Two of the modules of your account dashboard provide information only on a limited number of events.

Read more...

Internet users in China hit with a massive DNS issue

Posted on January 21st, 2014 by Websitepulse in WebSitePulse News, Tech

DNSToday (Jan 21, 2014) between 07:00 and 09:00 UTC mainland China was hit by a wave of network issues. A large number of both Chinese and international domains were reporting connection timeouts and were completely unaccessible. The cause for this was that for some reason a large number of domains were resolving to a single IP address - 65.49.2.178. The problem was reported as resolved in most places around 08:50. Due to the DNS caching infrastructure however a lot of users will still be affected until the cached bogus records expire. Users were suggested to use alternative DNS servers like Google's 8.8.8.8. We strongly recommend if you are using a DNS caching server in China to flush it as soon as possible to avoid DNS issues

The news sources in China first blamed it on a DNS poisoning of the root and the gTLD DNS servers. This however is not the case since the networks outside mainland China were not affected at all. Our investigation showed DNS responses from authoritative name servers coming with bogus data when queried from our servers in Beijing, Shangai and Guangzhou.

For example our first notice of the issue was when we requested the A record of static.bbci.co.uk. from ns1.thdow.bbc.co.uk (212.58.240.163), which is one of the authoritative DNS serves for bbc.co.uk, the response was

static.bbci.co.uk.      37621     IN      A 65.49.2.178

instead of  the correct record which is

static.bbci.co.uk.      900     IN      CNAME   static-bbci.bbc.net.uk.

This suggests that the response packet was modified in transit and the most likely culprit is the Golden Shield Project (also known as The Great Firewall of China). A possible reason for the misshap is that instead of blocking the 65.49.2.178 IP address all DNS queries were redirected to this IP. Ironically they actually succeeded blocking the IP by creating a massive DDOS attack from all Chinese users who were making connections to this address while trying to access different sites.

The offending IP 65.49.2.178 has an interesting story itself but I'll just put a few pointers
 - It is owned by Sophidea, Inc. registered on the address 2710 Thomes Ave Suite 884, Cheyenne, WY, 82001, US. Reuters ran a special story about this address a few years ago (www.reuters.com/article/2011/06/28/us-usa-shell-companies-idUSTRE75R20Z20110628)
 - While there is scant information regarding Sophidea, Inc I can see that they are providing hosting services to a large number of companies and the IPs from this range were frequently reported for spam
 - Hosted on the same network range is ultrasurf.us which was created to provide means to bypass the China Firewall and provide anonymous Internet access. Ultrareach Corp - the company which owns UltraSurf is registered on the same postal address in Wyoming above. There was some discussion of the actual value of the services provided by UltraSurf  (blog.torproject.org/blog/ultrasurf-definitive-review) but still their service might have something to do with the Chinese goverment wanting to restrict access to this netblock

 Update Jan 22, 2014

Read more...