Under Attack – Bella Caledonia | #cybersecurity | #cyberattack

For months now this site has been under a Denial of Service attack (DoS)*.

We’ve been protecting ourselves with CloudFlare, but have now moved to a dedicated enhanced server to allow us to block these attacks and continue publishing.

Our technical support company (a small independent company based in Edinburgh) have been really great and we are very grateful for their help.

We have no idea who is behind these attacks or what their intention is, if any. We don’t know if it’s political or just random.

Anyway, it’s costing us hundreds of pounds to make this move and increased monthly fees to maintain.

We operate on a very tight budget so if anyone wants to help out with a donation at this time that would be a great help. I know everyone’s skint so any help much appreciated.

Donate here: Donate – Bella Caledonia

Thanks, Mike

* In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. More sophisticated strategies are required to mitigate against this type of attack, as simply attempting to block a single source is insufficient because there are multiple sources.

A DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, thus disrupting trade.

Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks or credit card payment gateways. Revenge, blackmail and activism can motivate these attacks.

Original Source link

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Leave a Reply

Your email address will not be published.

42 − thirty three =