2009/11/21

樁姬彩菜 - 我是男校畢業的女生

今天上完家教網頁教學課程,與朋友約在東區的sogo見面,晃著晃著我到了最頂樓的誠品書局,也看見了這一本書。

我是男校畢業的女生 - 一時間也不知道這是什麼書,直覺是一個可愛的女生搞笑的紀錄以前在南校的生活點滴,因為封面實在太可愛了!

ayana_tsubaki-1

就是因為太可愛了

所以我就順手翻了開來,細細閱讀,才發現是作者一段辛苦且勇敢的過程

徹底的說明變性人的心路歷程,外界很難去思考到的地方。大多數的人看看新聞發現這類的題材,可能就是看了一下不經心的就過去了

畢竟現在人資訊爆炸,每天來自各種管的資訊一直輸入我們的腦中


麻痺的我們,是沒有辦法仔細去思考這個與我們無關的議題。只是這本書,以作者第一人稱日記方式書下這樣的感受,讓我們可以了解她的苦,字裡行間皆是小女生的筆觸

我看了覺得她很努力也很勇敢,更是帶著些許的任性。讓我思考,任性真的是不好的嗎?

如果作者是個不任性的孩子,乖乖的承受這一切不自在與痛苦,這樣她仍是過著一樣的被排斥的生活

我想任性是表示有自己的想法,有自己想做的;當然必須為自己負責就可以了

2009/11/20

bonk attack

Read those URL’s;
http://www.dslreports.com/forum/remark,3303025

The Bonk attack is a variation of the now infamous Teardrop attack, and works much like the Boink attack, although it does not allow UDP port ranges. The Bonk attack manipulates a field in TCP/IP packets, called a fragment offset. This field tells a computer how to reconstruct a packet that was broken up (fragmented), because it was too big to transmit in a whole piece. By manipulating this number, the Bonk attack causes the target machine to reassemble a packet that is much too big to be reassembled. This causes the target computer to crash. A simple reboot is usually sufficient to recover from this attack. It is possible that unsaved data in applications open at the time of attack will be lost.
The “Bonk” attack, a modified version of the Tear Drop exploit program, is the most recent attacks against hosts. This attack involves the perpetrator sending corrupt UDP packets to port 53 (DNS).

So it appears she was the victim of an attempt of Denial of Service attack (DoS), from Bonk.c on someone’s machine. It could be just a coincidence that she was on Yahoo chat/IM at the time. You didn’t mention her operating system. If she’s on Win95 or NT, she’s particularly vulnerable to this, as they have holes that Bonk.c exploits, but I’ve seen a site with a patch for it in the second link I gave above.

http://archive.networknewz.com/networknewz-10-20041201DenialOfServiceAttack.html

Teardrop: The culprit sends two fragments that cannot be reassembled properly by manipulating the offset value of the packet and cause a reboot or halt of the victim’s system.

Bonk: This attack usually affects Windows OS machines. The culprit sends corrupted UDP Packets to DNS port 53. The system gets confused and crashes.

Boink: This is similar to the Bonk attack; accept that it targets multiple ports instead of only 53.

ascend kill

Define

http://www.securityspace.com/smysecure/catid.html?id=10019

Category:Denial of Service
Title:Ascend Kill
Summary:Crashes an ascend router
Description:It was possible to make
the remote Ascend router reboot by sending
it a UDP packet containing special data on
port 9 (discard).

An attacker may use this flaw to make your
router crash continuously, preventing
your network from working properly.

Solution : filter the incoming UDP traffic coming
to port 9. Contact Ascend for a solution.

http://www.speedguide.net/port.php?port=9

Port(s)ProtocolServiceDetailsSource
9tcp,udpDiscardDiscard server – this protocol is only installed on machines for test purposes. The service listening at this port (both TCP and UDP) simply discards any input.

See also: [RFC863], CVE-1999-0060
Intrusions: Ascend kill
This exploit kills Ascend routers by sending them a specially formatted malformed TCP packet. On certain versions of the Ascend operating system, the router can be forced to cause an internal error, resulting in the router rebooting.

SG
9tcp,udpDiscard (official)Wikipedia
9tcp,udpdiscardDiscard [RFC4960] [RFC4340]IANA
9tcp,udpdiscardDiscardSANS
9tcp,udpdiscardsink nullNmap

5 records found

Discard Protocol

http://tools.ietf.org/html/rfc863

This RFC specifies a standard for the ARPA Internet community.  Hosts onthe ARPA Internet that choose to implement a Discard Protocol areexpected to adopt and implement this standard. A useful debugging and measurement tool is a discard service. A discard service simply throws away any data it receives.TCP Based Discard Service   One discard service is defined as a connection based application on   TCP.  A server listens for TCP connections on TCP port 9.  Once a   connection is established any data received is thrown away.  No   response is sent.  This continues until the calling user terminates   the connection.UDP Based Discard Service   Another discard service is defined as a datagram based application on   UDP.  A server listens for UDP datagrams on UDP port 9.  When a   datagram is received, it is thrown away.  No response is sent.