Where were you when JFK was shot? Where were you when the planes hit the towers? Where were you when Deb Frisch went off her rocker and began her threats against Jeff Goldstein and his 2 year old toddler? To answer the third question, I was there. Strange as it may seem to me, I was actually lurking and reading comments on the thread when Deb Frisch started posting her garbage as Southwestpaw. I've stayed out of the discussion and the whole brouhaha mainly because others seem to have the situation under control. I have read Frisch's accusations that her comments have been changed and that is hogwash. I saw them in their original postings and I've seen them reproduced and, unfortunately, they are just as ugly the first time around and totally accurate in the repostings. Or so it seemed until today and the new information that Protein Wisdom is now undergoing its third DDOS attack since this whole story began while Dr. Demented rewrites history and claims she never said what she said and besides what she didn't say was all a joke and a teaching lesson.
I realize that lots of techy types out there understand these DOS/DDOS attacks and how they work. I can say that I know what it is like to be on the receiving end. That part is simple, you are down for the count, plain and simple. But, how an attack is launched is beyond my tech level.
The following I picked up off Wikipedia:
Distributed Denial of Service Attack
A Distributed Denial of service attack (DDoS) involves multiple compromised systems flooding the bandwidth or resources of a targeted system usually a web server(s). These systems are compromised by attackers using a variety of methods.
Malware can carry DDoS attack mechanisms one of the more well known examples of this was MyDoom its DoS mechanism, was triggered by a certain date and time. This type of DDoS involved hardcoding the target ip prior to release of the malware and no further interaction was necessary to launch the attack.
A system may also be compromised with a trojan allowing the attacker to download a zombie agent or the trojan may contain one. Attackers can also break in to systems using automated tools that exploit flaws in programs listening for connections from remote hosts, this scenario primarily concerns systems acting as servers on the web.
Stacheldratis a classic example of a DDoS tool it utilises a layered structure where the attacker uses a client program to connect to handlers which are compromised systems that issue commands to the zombie agents which in turn facilitate the DDoS attack. Agents are compromised by the handlers which use automated routines to scan for and exploit vulnerabilities in programs that accept remote connections running on the target hosts. Each handler can control up to a thousand agents. [1]
These collections of compromised systems are known as botnets, DDoS tools like stacheldrat still use classic DoS attack methods centered around ip spoofing and amplification like smurf and fraggle attacks (these are also known as bandwidth consumption attacks), SYN floods (also known as resource starvation attacks) may also be used newer tools can use DNS servers for DoS purposes. (see next section)
Unlike MyDooms DDoS mechanism botnets can be turned against any ip address, script kiddies use them to deny the availability of well known websites to legitimate users. [2] More sophisticated attackers will use DDoS tools for the purposes of extortion and even against their business rivals. [3]
It is important to note the difference between a DDoS and DoS attack if an attacker mounts a smurf attack from a single host it would be classed as a DoS attack. In fact any attack against availability e.g. using High-energy radio-frequency weapons to render computer equipment inoperable would be classed as a Denial of Service attack.[4] On the other hand if an attacker uses ten thousand zombie systems to simultaneously launch smurf attacks against a remote host this would be classed as a DDoS attack.
Truth Laid Bear is asking for input on how to protect bloggers who are forced down by these types of attacks. I can't say I really understand all the suggestions, but trust that those who would put some of the suggestion to work do.
As to the ongoing controversy with Dr. Demented (Deb Frisch), see: Protein Wisdom (UPDATE)
Also, I was able to find a window of uptime to grab a screenshot of Deb’s comments by IP from the other night. The screenshot appears below the fold. The comment where she mentioned frenching—which she’s now denying she wrote—is highlighted. See the original here.
If Frisch now wants to claim that I altered her comment in some way—rather than suggesting she never wrote it to begin with—we’re talking about libel.
Note that I began my post detailing her comments at 10:05 pm and simply cut and pasted her comments as they came in. The comment in question came in at 10:07. The first direct response to it—which quotes from it -- comes at 10:10. Directly after that, Frisch comments again. And again. And again. And again (here, she repeats the “progeny” line). And again. And not ONCE does she say that her comment has been altered.
So unless I’m engaging in some very fast multitasking—putting up the post, altering her comments, etc., she said what she said. And it’s there for all to see. In fact, she comments in the very thread where I reproduced it, and doesn’t mention anything about the comment being false or altered in any way.
In fact, here’s another mention of her wanting me to kiss the “spawn” for her. Still no suggestion I altered the comment.
But does that stop the folks from Sadly, No! from going to bat for her? Well, SADLY, NO!
Frisch is a liar. She should have let this go. And those sites who are repeating her libels should probably reconsider and issue corrections. Because up until now, I haven’t really been pissed. But that’s beginning to change.
As it should Jeff. I would have been highly pissed several days ago.
Related:
Michelle Malkin and HERE and HERE and HERE
The Anti-Idiotarian Rottweiler
And from a new comment at Protein Wisdom, now that they are back up:
Frisch is proof that a “fruit loop” isn’t just something that you find in a cereal box. The hat that she is wearing isn’t made out of tin foil; it’s made out of lead, which is why logic and reason have difficulty reaching her brain. (You could say that Frisch is a Lead-Head, instead of a moonbat.)
Love it ... when moonbats go so far even other moonbats disown them ... Lead Heads! LOL
Hi Sara,
I have been posting on Jeff Goldstien's website
Protein Wisdom about a Mr. Bath Bear Product, and more.
I really cannot believe how "VILE" this Deb Frisch woman is/was/is. Disgusting.......
Hope your well Sara.
MarioGeorgeNitrini111
mariogeorgenitrini111
_______________________
The OJ Simpson Case
Posted by: Mario G. Nitrini 111 | 10 July 2006 at 09:40 PM
Many programms include spyware modules. Use anti-spyware for protect your privacy.
As for me, I like professional anti-spy software like PrivacyKeyboard by Raytown Corporation LLC.
You can download it here: http://download.softsecurity.com/1/14/prvkbd.zip (~4MB)
Posted by: Simon Scatt | 11 July 2006 at 10:59 PM
Good point! Add to that, stop the crazy radio frequency weapons assaults, and we'll all be crappin' in tall free cotton again.
http://www.zippyvideos.com/3421564785253376/rfi_directed_with_3d_needles/
Posted by: Chrispopher Prostate | 17 September 2006 at 01:06 AM