SEO

August 7, 2010

Advice for Posterous DoS

  1. The Official Posterous Posterous: Who're Attacking Posterous? My Official Personal Posterous Denial of Service (DoS) Advice on Catching the Hacker and Getting Laid!
    1. Moving Forward
      1. This morning, our new IP address, which we announced on Wednesday, began suffering a Denial of Service attack just as the old one had. For those of you who recently switched your custom domains to the new IP, you'll find that your site is once again down (which is good news for those of us who milk cows).
      2. Getting Back Online
      3. Having trouble? It's understandable, since this stuff isn't always easy. If you can't get this figured out, send me an email personally, at help+jackson@posterous.com (nice guy) with the subject line "Custom Domain". (once again, if you can afford your own website, just get your butler to fix it).
        1. If you can, include who your domain registrar (or other DNS host) is, and ideally provide a screenshot of the screen you're looking at. I'll respond back with detailed instructions tailored to your situation as quickly as I can. (yeah, sorry, no sympathy, and while you're getting your tailor to help, I wear a 40L. how bout something in a classic hounds tooth)
      4. Bulking Up
      5. Identifying the Source
      6. Many users have asked us about the cause of these attacks (I'd question them first. simple TV Detective Work, or you could play along and pretend like you're interested in their questions, but try to keep them on the line for longer than five minutes, that way you can narrow down their location. Also listen for audible clues, such as any background noise which you may think is insignificant, but which the Forensic DNS Expert will be the first to tell you can provide the greatest advantage in their case. RE: The guy who was trying to be helpful in the Twitter DNS Killer Whale Incident, was identified by his 140 word answering machine message).
      7. First, a quick explanation about Denial of Service (DoS) attacks. Wikipediamore info, (be careful with the Wikipedia after a huge DoS Attack, some of the Dossers will actually EDIT the Page to their advantage and it may be a day or two before even the most rabid Wikipedians can file an Immediate Removal) but it's often hundreds or thousands of computersall in one place, but often they are distributed around the world, many times otherwise-innocent systems that had been infected with a virus. The people who control that virus can send instructions for the new attack when the infected systems phone home periodically. (Jesus, are you guys okay? I bet the wife doesn't use that tone of voice when her girlfriends ask what her husband does anymore...'oh, he's the CEO of a Blog' making as many requests as they can of a single website. Sometimes these computers are has
        1. The motive of these attacks is often unclear (i like where you're going with it, but i've glanced ahead, and you might not want to tip your cards quite that much. NEXT TIME, try something like: DOES ANYONE HAVE A FRIEND WHO LIKE MAY HAVE SENT A MILLION EMAILS YESTERDAY...I MEAN, IN CASE YOU RECIEVED AN EMAIL WITH A CC ON IT THAT WAS REALLY LONG...?). It could have been an individual hacker/cracker (SORRY, the last person I'd suspect of having the inclination or the ability to pull this off is a Redneck, however, next time you find a COW on the Company's Roof, that might be a good guess), who wants to show off a bit ("Hey, Baby, You know that dude who was puttin down Skynard the other day on Posterous, I fuckin' shut his ass down!"). It could have been a piracy group that was upset about us removing abusive material. (Here again, this is one of the oldest stereotypes in the world...those guys are more into the Rum and Parrot Ships, or if you're talking about the African Ones, Rum and Parrot Ships) It could have been a foreign government (I was hoping I wasn't going to have to give you any Frank Sinatra advice about 'overdoing' the INTRIGUE. BELIEVE ME, YOU WOULD HAVE GOTTEN ROYALLY LAID BEFORE YOU ENDED WITH THE COLUMBO ROUTINE. Now, I'm worried, not that you won't get laid over this, but that you'll only have about 50% of the choice) wanting to silence someone using Posterous to protest (that's ridiculous. I'm not crazy about your Post Editor, but I believe you have a right to use it).
        2. Tracking down the source of these kinds of attacks is a tricky challenge (maybe a little stronger word than 'tricky'). First, they often disguise their source addresses, and that's true in this case. We're getting hundreds of thousands of large requests every second (no marketing expert, but I'd say work the social-networking angle of that somehow. Ask that freaky Mashable guy with the absurdly square jaw who has blogger tattooed on his penis what he would do) from systems that all identify themselves as 0.0.0.0 (first clue: LOW SELF-IMAGE!), which is an invalid address. Secondly, our host quickly kills our address when the attacks start, so we have a very small sample of requests that made it through to analyze.
          1. We've made a call to the relevant authorities to enlist their help, as forensic analysis of evidence of these attacks is a very specialized skill. ( BY all means Kiss THEIR ass in advance like that. Have you seen the SNL IT Guy Sketches? Those guys are FREAKS!)
            1. So while we're hoping we do eventually find an answer, it could be that we'll never find out what exactly happened. For now, we'll concentrate on bulking up to stay as tough as possible against the wild west that still is the Internet. We'll do our best, we humbly apologize for our failures thus far, and we greatly thank you all for your continued support and patience.
    2. UPDATE (4:53p PDT): At the moment, all attacks have ceased, and all Posterous sites should be up and running. While we still advise making the changes above, it's no longer necessary to do so.
          1. CONGRATULATIONS GUYS!
            1. LIMBS

The Official Posterous Posterous: Who're Attacking Posterous? My Official Personal Posterous Denial of Service (DoS) Advice on Catching the Hacker and Getting Laid!

August 06, 2010

Moving Forward

This morning, our new IP address, which we announced on Wednesday, began suffering a Denial of Service attack just as the old one had. For those of you who recently switched your custom domains to the new IP, you'll find that your site is once again down (which is good news for those of us who milk cows).

We certainly knew there was a risk of this happening, but we were hoping that the attack on the old IP would be the end of it. This morning, our operations team responded by bringing up multiple new servers and reviving the old IP address, which is no longer under attack.

Getting Back Online

If you're a user of a .posterous.com subdomain, a custom domain you purchased through Posterous, or a custom domain that has not yet had its A record updated to the new IP, your site should now be up.

If, unfortunately, you were one of the people who responded promptly to Wednesday's outage (don't understand this one), you'll need to either wait for this attack to end or change your address again to get your site back online.

no offense to those effected, but i don't care about your ritzy "owned" domain problems, I've got my own posterous.com problems--little schadenfreude goes a long way.

At this point, to mitigate future issues as much as possible, we're recommending the following course of action for these users. It's slightly more complicated, but it should be somewhat more durable as well:

  1. If you point your main domain to Posterous (ie: mydomain.com) and DO NOT receive email at that domain: We recommend that you point your www subdomain to posterous.com via a CNAME record, and do the same for your main domain (sometimes referred to as @) if your registrar allows the main domain to use a CNAME record. If yours does not, follow the next steps:

  2. If you point your main domain to Posterous (ie: mydomain.com) and DO receive email at that domain: We recommend that you point your www subdomain to posterous.com via a CNAME record, and you point your main domain to 66.216.125.32 via an A record.

  3. If you point a subdomain to Posterous (ie: blog.mydomain.com): we recommend that you point your subdomain to posterous.com via a CNAME record.

The new CNAME records should follow us as we make any changes to servers in the future, unlike an A record, which must be changed each time. We hope there won't be many changes in the future, but we thought that last week too.

Having trouble? It's understandable, since this stuff isn't always easy. If you can't get this figured out, send me an email personally, at help+jackson@posterous.com (nice guy) with the subject line "Custom Domain". (once again, if you can afford your own website, just get your butler to fix it).

If you can, include who your domain registrar (or other DNS host) is, and ideally provide a screenshot of the screen you're looking at. I'll respond back with detailed instructions tailored to your situation as quickly as I can. (yeah, sorry, no sympathy, and while you're getting your tailor to help, I wear a 40L. how bout something in a classic hounds tooth)

Bulking Up

If you're wondering about the new IP address, it's part of our plan to reinforce our services. Tonight, we'll have an outage at 10p PDT for 2-4 hours while we switch to a new host, datacenter, and significantly beefier servers. We'll also be with a host that has better capabilities for dealing with these types of attacks, and more expertise we could leverage to evade or prevent them in the future.

We're confident that the new move will mean a faster Posterous, higher reliability, and more resiliency to attacks like those we've experienced this week. Of course, this doesn't guarantee we'd survive more attacks, but it will give us a significantly better chance to weather the storm.

Identifying the Source

Many users have asked us about the cause of these attacks (I'd question them first. simple TV Detective Work, or you could play along and pretend like you're interested in their questions, but try to keep them on the line for longer than five minutes, that way you can narrow down their location. Also listen for audible clues, such as any background noise which you may think is insignificant, but which the Forensic DNS Expert will be the first to tell you can provide the greatest advantage in their case. RE: The guy who was trying to be helpful in the Twitter DNS Killer Whale Incident, was identified by his 140 word answering machine message).

First, a quick explanation about Denial of Service (DoS) attacks. Wikipediamore info, (be careful with the Wikipedia after a huge DoS Attack, some of the Dossers will actually EDIT the Page to their advantage and it may be a day or two before even the most rabid Wikipedians can file an Immediate Removal) but it's often hundreds or thousands of computersall in one place, but often they are distributed around the world, many times otherwise-innocent systems that had been infected with a virus. The people who control that virus can send instructions for the new attack when the infected systems phone home periodically. (Jesus, are you guys okay? I bet the wife doesn't use that tone of voice when her girlfriends ask what her husband does anymore...'oh, he's the CEO of a Blog' making as many requests as they can of a single website. Sometimes these computers are has

The motive of these attacks is often unclear (i like where you're going with it, but i've glanced ahead, and you might not want to tip your cards quite that much. NEXT TIME, try something like: DOES ANYONE HAVE A FRIEND WHO LIKE MAY HAVE SENT A MILLION EMAILS YESTERDAY...I MEAN, IN CASE YOU RECIEVED AN EMAIL WITH A CC ON IT THAT WAS REALLY LONG...?). It could have been an individual hacker/cracker (SORRY, the last person I'd suspect of having the inclination or the ability to pull this off is a Redneck, however, next time you find a COW on the Company's Roof, that might be a good guess), who wants to show off a bit ("Hey, Baby, You know that dude who was puttin down Skynard the other day on Posterous, I fuckin' shut his ass down!"). It could have been a piracy group that was upset about us removing abusive material. (Here again, this is one of the oldest stereotypes in the world...those guys are more into the Rum and Parrot Ships, or if you're talking about the African Ones, Rum and Parrot Ships) It could have been a foreign government (I was hoping I wasn't going to have to give you any Frank Sinatra advice about 'overdoing' the INTRIGUE. BELIEVE ME, YOU WOULD HAVE GOTTEN ROYALLY LAID BEFORE YOU ENDED WITH THE COLUMBO ROUTINE. Now, I'm worried, not that you won't get laid over this, but that you'll only have about 50% of the choice) wanting to silence someone using Posterous to protest (that's ridiculous. I'm not crazy about your Post Editor, but I believe you have a right to use it).

Tracking down the source of these kinds of attacks is a tricky challenge (maybe a little stronger word than 'tricky'). First, they often disguise their source addresses, and that's true in this case. We're getting hundreds of thousands of large requests every second (no marketing expert, but I'd say work the social-networking angle of that somehow. Ask that freaky Mashable guy with the absurdly square jaw who has blogger tattooed on his penis what he would do) from systems that all identify themselves as 0.0.0.0 (first clue: LOW SELF-IMAGE!), which is an invalid address. Secondly, our host quickly kills our address when the attacks start, so we have a very small sample of requests that made it through to analyze.

We've made a call to the relevant authorities to enlist their help, as forensic analysis of evidence of these attacks is a very specialized skill. ( BY all means Kiss THEIR ass in advance like that. Have you seen the SNL IT Guy Sketches? Those guys are FREAKS!)
So while we're hoping we do eventually find an answer, it could be that we'll never find out what exactly happened. For now, we'll concentrate on bulking up to stay as tough as possible against the wild west that still is the Internet. We'll do our best, we humbly apologize for our failures thus far, and we greatly thank you all for your continued support and patience.

UPDATE (4:53p PDT): At the moment, all attacks have ceased, and all Posterous sites should be up and running. While we still advise making the changes above, it's no longer necessary to do so.

CONGRATULATIONS GUYS!

YOU ROCK~

LIMBS

Retrieve Facebook Comments tutorial/code by Gil "I found a way Wohahaha" Goldshlager (gil.goldshlager on Facebook)

 Retrieve Facebook Comments code by Gil Goldshlager:

 

 i've just got to say that for the first time in the history of anything having to do with this application and me using it, I installed this and viewed it with 100% expected results in under three minutes--from logging on to the forum to pressing save on Blogger. 

I won't say what a 'shocking' genius you are because i'm sure it would only replace all my shock, [swear word], and god-damns with shocks, shocks, and shocks, but: you are a shock genius

and thanks.

2010-08-05 19:33:56

Retrieve / Manage Comments-Box comments tutorial

Important!
This tutorial is not for how to setup the comments-box plugin,

for this visit: for regular websites | for Tumblr blogs | for Blogger blogs.
This tutorial is for how to retrieve/show/display/pull/grab/manage (or however you want to call it),
all the comments on your site by the Comments-Box plug-in.

Let's start
  smile

instructions for Blogger (only)
Now, Blogger doesn't give you a way to create a new blank page,
what it does it is using the same template for each page and let you only change the content.

  • But I found a way to bypass it (Wohahaha...^_^)


what we just done is telling Blogger that if the page name is "Facebook Comments" then hide all the and content.
by that we are hiding the regular template and when we will view the page name "Facebook Comments" it will be blank.
cool
4. Let's create the page!
go to "Posting" > "Edit Pages" and click on "NEW PAGE"
enter the "Page Title:" this MUST to be exactly "Facebook Comments"
click on "Edit HTML" tab, Download the code, copy & paste it in the textarea.

5. Search for:
// Application ID# - enter your application ID# (Not API Key!) //
var appid = 'YOUR-APP-ID';
and start edit all these variables as you wish.
(until // Background Color )

6. Click on "PUBLISH PAGE".
7. Done!
visit your page click on "View Page"
(http://------------.blogspot.com/p/facebook-comments.html)


First thanks to 'pingflood' & 'TH_Wesley' who helped me with some of the codes.

-----------------------------------------------------------------------------------------------------------------------------------------

-----------------------------------------------------------------------------------------------------------------------------------------

1. The variables

General for all:
// Application ID# - enter your application ID# (Not API Key!) //
var appid = 'YOUR-APP-ID';

// Admin ID# - enter your admin ID# (facebook profile id# in numbers, not a name id) //
var adminid = 'YOUR-ADMIN-ID';

// Limit - number of comments to dispaly (default is '-1' unlimit [99999999999999999]) //
var comments_limit = '-1';

// Width - the width for example '800px' (default is '0' auto) //
var comments_width = '0';

// Margin - the margin of the whole content
// if you changed the width-setting above from '0' (auto), -
// then you may want to change this setting to '0 auto' to center it (default is '0px 15px') //

var comments_margin = '0px 15px';

// Paging - change to 'false' if you don't want pagging (default is 'true') //
var paging_comments = 'true';

// Paging Limit - number of comments per page (default is 10) //
var paging_limit = '10';

// Count - change to 'false' if you don't want comments count (default is 'true') //
var comments_count = 'true';

// Login header - change to 'false' if you want to hide the login header (default is 'true') //
var login_header = 'true';

// Local Date type - change to 'true' if you want the local type (default is 'false') //
var localdate = 'false';

// Dark style - change to 'true' if you want it dark (default is 'false') //
var dark_style = 'false';

// Background Color (if dark style is 'true') - change to blank '' for transparent (default is '#000' black) //
var bgcolor = '#000';

Retrieve Facebook Comments code by Gil Goldshlager: i've just got to say that for the first time in the history of anything having to do with this application and me using it, I installed this and viewed it with 100% expected results in under three minutes from logging on to the forum and pressing save.  I won't say what a 'shocking' genius you are because i'm sure it would only replace all my shock, [swear word], and god-damns with shocks, shocks, and shocks, but: you are a shock genius.  and thanks.

mrjyn Limbs Andthings Facebook 
http://whatgetsmehot.blogspot.com 
What Gets Me Hot Blog 
http://youtube.com/limbsandthings1 
Limbsandthings YouTube 
http://youtube.com/youweirdtube 
YouWeirdTube 
http://whatgetsmehot.posterous.com 
Dogmeat (WhatGetsMeHot.Posterous)

Tiger Woods Transcribed Phone Sex (Chinese Cartoon)

The New Pornographers | Myriad Harbour Lyrics | Lyrics Domain on Facebook (7)

I took a plane, I took a train | Sorry, my bad!

Kate Dick - Photographer

German Lesbians Take Turns Reading Book