April 2013 ~ New Technolog Google Updates

Best SEO. SMM and SEM services Chandigarh

This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Monday, 1 April 2013

Sabotage of undersea cables to slow down internet speed for 25-30 days

NEW DELHI: Internet speeds in India, especially for customers of Bharti Airtel, Tata Communications and state-owned BSNL and MTNL are set to be disrupted for the next 20-25 days, after a key undersea cable, carrying data traffic across 14 countries, fromSingapore to France, was cut off the coast of Egypt. Two other key cable networks, linking Asia to Europe, were also allegedly damaged. 

The extent of the damage is still being assessed. "Currently, internet and data usage are low because of the festive season. India will feel the impact from Monday when offices and businesses come back. Telcos have diverted all traffic from the Atlantic route to the Pacific, but our connectivity to the latter route is not sufficient to cater to all of India's traffic," explained Rajesh Chharia, president at Association of Internet Service Providers of India.


 Bharti Airtel said that the cable cuts had not impacted its voice traffic but said it was taking all 'necessary steps to ensure data services were available to our customers by routing traffic on alternative routes'.

BSNL executives said the company was diverted its traffic on other cables linking India with the Europe and the US, but declined to reveal the extent of internet disruptions here. Reliance Communications said its customers were not impacted as its cable systems, including FEA, FALCON and HAWK, were not impacted, when the undersea cables were allegedly sabotaged.

Executives with mobile phone companies, who did not want to be named, acknowledged that browsing speeds were likely to fall significantly in the coming days, even as they were unable to provide a timeframe as to when the problem will be resolved.

On Thursday, Egypt announced that it has arrested three divers for allegedly slicing the South East Asia-Middle East-West Europe 4 (SEA-ME-WE 4) that runs from Singapore to France and connects Malaysia, Thailand, Bangladesh, India, Sri Lanka, Pakistan, UAE, Tunisia and Algeria.

'Biggest cyber-attack in history' slows down internet worldwide after quarrel between web-hosting company and anti-spam group

The attackers are throwing so much digital traffic at online networks that they have reportedly disrupted access to popular sites such as Netflix, the on-demand TV streaming service. Tonight there were fears that any worsening of the attack could affect web browsing and emails.

The onslaught has focused attention on the extent to which modern communications depend on the internet. Matthew Prince, chief executive of CloudFlare, one of the firms dealing with the assault, likened it to a series of digital “nuclear bombs”. “It’s so easy to cause so much damage,” he added.

The attack is believed to have begun last week, when Spamhaus, an anti-spam organisation, was hit by a wave of digital traffic that knocked its website offline. The body draws up  lists of the servers used to send spam messages around the world. Email administrators use these lists to block spam.

But last week one of the spammers irked by Spamhouse’s work is believed to have launched the massive distributed denial of service, or DDoS, attack to bring down the anti-spam group.

Pretending to be Spamhaus, the attackers sent a series of data requests to DNS servers, which help direct web traffic around the world. While many of these servers can only be accessed by authorised users, thousands are “open” and can be targeted by attacks like those that first struck last week.

After receiving what they thought were legitimate requests, the servers responded by sending the required data to Spamhaus, which could not deal with the wall of information that suddenly came its way. The attack, which still had not been fully dealt with last night, was so large that it began clogging up the DNS servers. This in turn slowed down replies to the ordinary internet users, hitting connections worldwide.

Spamhaus said it does not yet know who carried out the attacks. “A number of people have made claims to be involved,” it said in an email statement yesterday. “At this moment it is not possible for us to see if they really are.”

Cyberbunker, a web hosting service based in the Netherlands, has been named by reports as a potential culprit. It was recently added to one of Spamhaus’s anti-spam lists. With more than 10,000 dedicated servers, and housed in a disused nuclear bunker, it offers anonymous hosting to its customers. Its website states: “In most cases we have no idea who or where our customers actually are. We do not known and we simply don’t care.”

The company did not immediately respond to a request for comment.

Bytemare: how the attack worked

The attackers tried to overwhelm their target by sending it heavy traffic. A flood of requests to view a site at the same time will exceed its capacity – stopping it from loading.

Spamhaus sought greater capacity, turning to CloudFlare, which can spread the traffic over a larger bandwidth. However, the attackers began targeting their attacks so they would be concentrated. This congestion was so heavy that it overwhelmed DNS routers, used to direct internet traffic. The congestion caused meant that connections across the internet slowed down.

Internet networks also use Internet Exchanges to connect to each other and share bandwidth. If one becomes congested, requests are routed around the blockage, meaning other networks serving unrelated websites also took a share of the burden and could have been slowed down.