AFAIK it's easier to ddos ISP than a service itself, because often services are ready for this sort of attack, while ISP just lies down and dies. Some of our (at work) services use USA and GB ISPs and they were down as well, so we had to switch everything to russian ISPs for now
Originally Posted by Urban Dictionary
issue is when they make something to count ddosing, they change their bots around that... so yeah... its a race of, who can adapt first...
- - - Updated - - -
except when they make posts BEFORE the "ddos's" happen.. .for example their post said "blizzard is next" 5 minutes later the blizz servers start lagging...
- - - Updated - - -
also mods, feel free to close if you want, now that the DDos is over, and we have a few explinations here of how they work and why they work, for those who are wondering how
I feel so terrible for a $4+ billion corporation that can't seem to pull up the dough to be better protected.
Too fucking bad for Acti/Blizz and its fanboys. They get what they deserve.
you cant really protect against ddos... thats the thing -_- so please.. read one of the many examples here ,or do some research, as the only way to protect against ddos would make doing anything in the game take a long long time to do
also who shoved a stick up your ass? cause your being an awful jerk for no reason
Blizzard is just being lazy and apathetic. They are a 4+ billion company. They could anycast their bnet login servers, and other authentication services, but that would take actual work and it would be "hard". And as you can tell from their stance on vanilla servers, they are not capable of doing hard things any more.
RIP Blizzard. You were once respected. Now you are a laughing stock.
Push it to the limit
#NoCollusion
"The Special Counsel did not find that the Trump campaign, or anyone associated with it, conspired or coordinated with the Russian government in these efforts, despite multiple. offers from Russian-affiliated individuals to assist the Trump campaign."
LOL is being targeted now apparently, I just settled in with a coffee to do a few grinds of ranked
It's not because it would be hard to do or that they're lazy. It's because Blizz avoids putting a single penny or any effort into anything that would take a few bucks out of their profits unless they think it's absolutely needed - IOW something that would possibly hurt their bottom line. Otherwise, fuck what the customers might want or would make the game QoL better.
Then they just send the PR spinmeisters out to convince the fanboys that it's A-OK.
That's why they hate gold botters and pilots but look the other way on kickbotters, fly hacks, etc.
Last edited by Caolela; 2016-08-03 at 04:50 AM.
https://en.wikipedia.org/wiki/DDoS_mitigation
You can definitely mitigate against DDOS's otherwise there'd be a hell of a lot more websites going offline, eg google.
read one of the many examples here ,or do some research, as the only way to protect against ddos would make doing anything in the game take a long long time to do
yes they could counter it... but it would make doing anything on wow take much, much longer...
websites can protect against it much more because they dont need to have a ton of data being sent to you every single second, and have you send a bunch of data back every second, like a video game does... why do you think xbox, and playstation online have both been ddos'ed many times, pokemon go has even been ddosed... even league, it even got ddosed today, even steam gets ddosed sometimes...
Came for all the autistic shutins here REEEEEING and making death threats over having their pixels denied for less than a day.
Lulz were delivered
Comcast is a subscriber ISP not a backbone ISP. Please understand the difference.
They (subscriber ISPs) are usually the source of DDoS, but in case of Comcast they (seems to have) finally implemented BCP38.
-----
http://news.softpedia.com/news/pokem...ampaign=buffer
Now Blizzard, Steam, etc, just have to get that information. Enjoy.One thing LeakedSource staff spotted was that the first payment recorded in the botnet's control panel was of $1, while payments for the same package plan were of $19.99.
This looked like a test payment, most likely made by the person that set up the botnet's rental payment service. The data dump contained enough information to identify the person behind this initial payment in LeakedSource's own data stores. The team discovered a full name and email address, which the LeakedSource team had remembered seeing before.
Last edited by ipaq; 2016-08-03 at 11:00 AM.