Recently I did some consultancy work with a client who was used as a second hop in a DNS amplification attack and I've taken a bit of an interest in this phenomenon. So much interest in fact that I ran some experimentation of my own as to how easy it is to carry out this kind of attack. The results of my experiment follow in the rest of this post. I should forewarn that this is an extremely techie blog post so isn't for the faint hearted!
Please note that since Capistrano 3's release in October 2013 this Capistrano 2 based tutorial series has been superseded by an updated Capistrano 3 tutorial series.
John Lennon once said that 'Life is what happens to you when you're busy making other plans' and this week's blog post is good evidence of that.
Hello everyone and welcome to what will hopefully be the first in a long line of blog posts from the Zodiac Media team.
The aim of this blog is to share our knowledge, experiences and opinions on internet and technology related topics with the wider online community. In particular we will be writing with small and medium-sized businesses in mind as they comprise the majority of our client base. Posts are likely to fall into two main categories, 'techie' and 'non-techie'. We'll 'tag' blog posts accordingly so you don't waste your time.