Rate this content:
5 of 5 - 1 votes
Thank you for rating this article.
********************UPDATE********************
You should still read the article below....but comments are back. 
We have found a better comment system, unfortunately we could not preserve the old comment database. 
So we start again!
Please bring on your comments and questions, and thank you so much everyone for your patience as we worked through this issue.
*************************************************

Why does this happen?  Why am I the one apologizing?

Well folks, you may have noticed by now that we had to turn off and actually delete all comments on our articles.  The reason for this is simple: an attack attempt was made through our add-on/extension Ccomment.  Over 100 comments were made somewhat successfully attempting to inject code on our server, which eventually crashed this server and site.  Success?  I mean why?  What great success does this impact anyone?

We had to go through a fairly extensive diagnosis, at our cost, and found the issue.  The result was we had to completely remove the extension (which up until this point, we loved) and then we found out the database for that extension was corrupted as well.  So we lost all the wonderful feedback users had provided - questions - answers - all that - gone!

Seems that these days - any interaction between a web site and the outside world is an exploitable vulnerability for no particular reason other than to just screw with someone's life.  For a small family run business, this type of event almost unbearable.  Since this happened, I have seriously considered chucking in the towel.  We have always been about helping people - our cohorts - our customers - and anyone really.  The result of having our site and providing all this information has been a fairly stable training and consulting business that puts food on the table, pays taxes, and helps us move the Internet forward, as we have done since 1998.

While we ask for donations and support, truth is that rarely happens, especially outside the US, though 60% of our visitors are from elsewhere in the world.  Attacking small businesses is, in my opinion, thoughtless, heartless, reckless, and without justification.  For now we carry on - without your thoughts, your great questions, and your input as we know of no other fool-proof add-on that will not end up landing us in the same situation.  And we lost so much data - rebuilding that will take years and years.  For that we truly regret this change.  But we have been convinced to do whatever we can to keep providing this information on our site, so with some trepidation, we will continue to do so.  Thanks to those who have reached out and convinced us to keep moving forward.

Add comment

Submit

Did you learn something?
Did I save you time? 

Buy me a coffeeBuy me a coffee!

Find by Tag

5G Networks 6LoWLAN 6LoWPAN 802.11 802.11ah 802.11ax 802.11ay 802.11az ACL Addressing Analysis Ansible Architecture ARP Assessment AToM Backup Bandwidth BGP Biography Bloom's Taxonomy Briefings CBRS CellStream Cellular Central Office Cheat Sheet Chrome Cisco Clock Cloud Computer Consulting CPI Data Center Data Networking Decryption DHCPv4 DHCPv6 Display Filter DNS Documentation ECMP EIGRP Ethernet Ethics Flipping the Certification Model Follow Me Fragmentation Git GNS3 Google GQUIC Hands-On History Home Network HTTPS ICMP ICMPv6 IEEE 802.11p IEEE 802.15.4 In A Day Internet IOS Classic IoT IPv4 IPv6 L2 Switch L2VPN L3VPN LDP Learning Services Linux LLN Logging LoL M-BGP MAC MAC OSx Macro Microsoft mininet Monitoring Monitor Mode MPLS Multicast Name Resolution Netflow NetMon netsh Networking Network Science nmap Npcap nslookup Online Learning Online School OpenFlow OSPF OSPFv2 OSPFv3 OSX Parrot PIM Ping Policy POTS POTS to Pipes PPP Profile Profiles Programming Project Management Python QoS QUIC Requirements RIP Routing RPL RSVP Rural SAS SDN Security Self Certification Service Provider Services Sharepoint Small Business Smartport SONET Speed SSH SSL Subnetting T-Shark TCP TCP/IP Telco Telecom 101 Telecommunications Telephone Telnet Terminal TLS Tools Traceroute Traffic Analysis Traffic Engineering Training Travel Tunnel Utility Video Virtualbox Virtualization Voice VoIP VRF VXLAN Webex Wi-Fi Wi-Fi 4 Wi-Fi 5 Wi-Fi 6 Wi-Fi 6/6E Windows Wireless Wireless 5G Wireshark Wireshark Tip WLAN ZigBee Zoom

Twitter Feed