Indeed is the #1 job site worldwide, with over 100 million unique visitors per month. Indeed is available in more than 50 countries and 26 languages, covering 94% of global GDP.
Spark with Openfire and webchat:
Cisco – What is Jabber?
[root@starfish home]# date -d @1364436815
Wed Mar 27 22:13:35 EDT 2013
Here are a few reasons why it is not a good idea to use Google Docs / Online providers for Spreadsheet applications.
Google Docs, Sheets, and Slides size limits
Documents, spreadsheets, and presentations you create, as well as files that you upload, have some limits built in.
Documents: 1,024,000 characters, regardless of the number of pages or font size. Uploaded document files that are converted to the Google documents format can’t be larger than 2 MB.
Spreadsheets: 400,000 cells, with a maximum of 256 columns per sheet. Uploaded spreadsheet files that are converted to the Google spreadsheets format can’t be larger than 20 MB, and need to be under 400,000 cells and 256 columns per sheet.
I use YouMail for my voice mail provider.
They give you a certain phone number to which calls need to be forwarded for this to work:
These are the codes to enable forwarding for each specific condition:
Call Forward if Busy:
*67* PHONENUMBER #
Call Forward if Not Answered:
*61* PHONENUMBER #
Call Forward if Unreachable:
*62* PHONENUMBER #
Here are the driver files for the Zioshot 54 Mbps Wireless Lan USB Adapter WLB5254USB without having to install the application that comes with it. For use with wireless zero config built into windows.
Instructions for use with Windows XP.
Are the drivers installed for the network card?
If not they can be installed manually by going into the device manager from the hardware tab of MY Computer > Properties.
When installing the driver say I will chose driver then point to the approprate folder where you have extracted the zip files.
Do you have the Wireless Zero Configuration Service started ?
If not you can start it following these instructions:
At this point you should be able to see a little wifi icon in the bottom right corner of your screen to configure wifi connections.
Back in 2010 DNS Made Easy were affected with a Distributed Denial of Service attack (DDOS). Such things are commonplace on the net, but rarely do you find a provider being so forthcoming with information about the attack and related outages. They even issued SLA credits to all customers without having them have to apply for such credits.
Here is what they sent out:
Dear DNS Made Easy Client,
On August 07, 2010 DNS Made Easy was the target of a large multi Gb/s attack against all of our name servers. The attack started at 8:00 UTC and was fully mitigated by 14:00 UTC. During this time period there were regional outages from some or all of our name servers. Regional outages means that certain regions of the world were not able to resolve your DNS and other regions of the world were resolving normally. When all name servers were not reachable a DNS query would have been lost, when some name servers were not reachable then DNS performance would have been slower than normal but still operational.
The regional downtime was in very small periods but it still did affect the overall resolution for all of our client’s DNS. It is for this reason that we are explaining the situation in full to all of our clients now.
1) How long were the DNS outages?
In some regions there were no issues, in other regions outages lasted a few minutes, while in other regions there were sporadic (up and down) outages for a couple of hours. In Europe for instance there was never any downtime. In Asia downtime continued longer than other regions. In United States the west coast was hit much harder and experienced issues longer than the central and east coast.
2) Many clients have asked us if in fact there was downtime since they did not notice issues.
Many clients did not notice any DNS downtime. In fact many clients would not have noticed this issue if we had not sent this email. But we feel disclosure of this issue is something that we owe our client base.
If you want to see if there is a significant loss of DNS queries you can quickly compare your daily queries from this Saturday to last Saturday in the DNS Made Easy control panel. Overall query statistics comparing this Saturday’s query load (minus attack traffic) to recent Saturdays’ query loads shows that our servers properly responded to a query total this Saturday within a 2% difference from recent Saturdays.
3) Where did the attack come from?
We believe that the DDoS came from a botnet attack originating from Asia. Most attack traffic originated in or transited through China. The source IPs appear to be mostly spoofed but the vast majority are assigned by APNIC to Chinese Networks and Chinese ISPs. Traffic levels reported to us by our bandwidth providers regarding their connections through which this traffic entered their networks also points to origins in Asia.
4) How large of an attack was this?
This attack hit levels that were so high that our Tier1 upstreams were suffering latency and network issues for other clients at many of their locations due to this attack. This caused some of our Tier1 bandwidth providers to use their last resort response of null routing traffic to some of our IPs from some networks to prevent major service degradation to their core networks.
Measuring the exact size of this attack is rather difficult. However, discussions with our Tier1 bandwidth providers during the attack led to an estimate of 50 Gb/s in size. This was based on reports of multiple 10Gb/s lines being saturated at multiple different providers in different geographic regions.
During our after-action discussions internally and with our providers after the attack was mitigated we analyzed all information available to us through monitoring systems and traffic reports and we revised our estimate of the attack size to be fluctuating between 20Gb/s and 40Gb/s during the attack. We will never know the true size of this attack as we actively moved traffic around to different locations throughout the attack and IPs were temporarily null routed into and through various networks, and some traffic was blocked from provider to provider in response to the attack.
We do know that due to the service implication to the Tier1 providers, networking teams from China Netcom, China Telecom, Level3, GlobalCrossing, Tiscali, and Arbinet were involved to stop the attacks. Level3 and Arbinet both played special heroic roles in facilitating that the correct people were involved from all networks to make sure that the attack was stopped as quickly as possible.
5) How was this attack stopped?
Fighting attacks of this magnitude is very complex and a full answer involves much information that we do not want these criminals to know. What we can say is that that we used a combination of routing techniques, DDoS mitigation tools, customized firewalls, and high level inter-provider negotiations.
China Netcom and China Telecom had to null route the name servers from their networks in order for the attack to not impact other traffic they had going to the United States.
6) Will an SLA credit be issued?
Yes it will be. With thousands paying companies we obviously do not want every organization to submit an SLA form. Even though not all clients noticed the attack, we plan on issuing an SLA to every single paying DNS account.
You will be receiving an email about the SLA credit to your account in the next few days.
7) Does this affect your 100% uptime history?
Yes, any service outage would result in loss of uptime. We had a history leading uptime of over 8 years of 100% uptime. With a calculated two hour outage (which is probably longer than we were actually down for anyone) this DDOS attack put our overall uptime history at a calculated 99.9999%. This is still an excellent uptime history.
8) What would it take to get your 100% uptime history back?
That is mathematically impossible. But we can work on increasing our 99.9999% uptime history and we will work hard on building another run of more than 8 years of 100% uptime. We are confident that we can do it and we look forward to the challenge.
9) Would another DNS provider have been able to stop this attack?
We are sure that our competitors will claim that the answer is yes. In fact we have been called by several of our competitors with very amusing phone calls during and after the attack asking us to update our website to say that we no longer have a 100% uptime history (which we have started and will complete soon). This was a very large attack, so we do not believe that other DNS services could have stopped it either. If any of our customers are considering leaving our services based on this issue, then we would recommend highly that you request a detailed report for how any new potential DNS provider would deal with an attack of this magnitude. Please note that this was our first issue of downtime over our 8+ years of providing enterprise managed DNS services.
10) What is the next step?
At this time all DNS resolution is functioning as intended from all of our global locations.
In our 8+ year history, we have had numerous attacks against our services. Historically we have been able to mitigate these attacks without any service degradation. One thing we have always taken away from every attack is a deeper understanding of what we need to do to make our network and services stronger and more reliable.
This DDoS attack against us was different from others in that the size was massive enough that our standard mitigation strategies were not sufficient to prevent several network nodes from being flooded. We now have a deeper understanding of what happened during the attack and have started planning network upgrades and mitigation strategies to help fight these criminals in the future. It is, and always has been, our commitment to make the DNS Made Easy network the strongest and most reliable DNS network in the world.
11) Can I pay more for a higher level of service with DNS Made Easy?
We believe that we provide more service per dollar than any competitor in the DNS industry. This is why we have the best ROI in the industry. We do not do this by cutting networking cost. As many of you aware DNS Made Easy feels we can cut costs by eliminating a lot of the sales (including commissions), presales, and unnecessary marketing expenditures.
Everyone at DNS Made Easy feels that our network is as strong as or stronger than any competitor in the United States and Europe and you can verify this with speed tests and our highest industry uptime. As all DNS Made Easy customers know, as our customer base grows, so does our network. This is how we can continually keep adding to our network and always remain a fraction of the price of our competition.
You will hear more from our network team as we plan on adding additional precautions to keep everything running smoothly during attacks in the future.
One thing that I want to say is that we sincerely apologize that this happened to your DNS service. We understand that hundreds of thousands of domains rely on our DNS services each day to keep their businesses running smoothly. This is not something that we treat lightly and this is not something that we are going to just let slip away. We have already started to plan on building a network to focus on preventing attacks like this from causing any service disruption in the future.
Everyone here at DNS Made Easy would like to thank you for your continued loyalty and kind words during this time. We can easily say the DNS Made Easy customers are the best in the business.
Question, comments, concerns?
Please let us know. I personally will be answering as many tickets and questions as possible in the following weeks. Our full DNS Made Easy staff is dedicated to answering your questions and easing any concerns that you have.
President and Founder of DNS Made Easy