Amazon got pwned by MGS4 fans!
west-phoenix-az said: Back down |
I see you have a fascination with guns... >_>
It's a dns attack most likely, nothing to do with MGS4.
http://www.thestandard.com/news/2008/06/06/briefly-amazon-com-offline
UPDATE: It looks like it could be a DNS issue. It looks like Amazon's DNS entry got hacked. Here's what results from a Whois search for Amazon.com:
Smokey:~ jlgolson$ whois amazon.com
Whois Server Version 2.0
Domain names in the .com and .net domains can now be registered
with many different competing registrars. Go to http://www.internic.net
for detailed information.
AMAZON.COM.ZZZZZ.GET.LAID.AT.WWW.SWINGINGCOMMUNITY.COM
AMAZON.COM.MORE.INFO.AT.WWW.BEYONDWHOIS.COM
AMAZON.COM.IS.N0T.AS.1337.AS.WWW.GULLI.COM
AMAZON.COM
To single out one record, look it up with "xxx", where xxx is one of the
of the records displayed above. If the records are the same, look them up
with "=xxx" to receive a full display for each record.
FishyJoe said: It's a dns attack most likely, nothing to do with MGS4. UPDATE: It looks like it could be a DNS issue. It looks like Amazon's DNS entry got hacked. Here's what results from a Whois search for Amazon.com: Smokey:~ jlgolson$ whois amazon.com Whois Server Version 2.0 Domain names in the .com and .net domains can now be registered with many different competing registrars. Go to http://www.internic.net for detailed information. AMAZON.COM.ZZZZZ.GET.LAID.AT.WWW.SWINGINGCOMMUNITY.COM AMAZON.COM.MORE.INFO.AT.WWW.BEYONDWHOIS.COM AMAZON.COM.IS.N0T.AS.1337.AS.WWW.GULLI.COM AMAZON.COM
To single out one record, look it up with "xxx", where xxx is one of the of the records displayed above. If the records are the same, look them up with "=xxx" to receive a full display for each record.
|
A reply on that page:
your "update" with conjecture that it's DNS based is really, really uninformed.try your "whois" test with microsoft.com or apple.com ... it's the same thing.
your awareness of how the version of the "whois" command operates is the only thing that's been compromised.
DMeisterJ said:
A reply on that page: your "update" with conjecture that it's DNS based is really, really uninformed.try your "whois" test with microsoft.com or apple.com ... it's the same thing. your awareness of how the version of the "whois" command operates is the only thing that's been compromised. |
You do understand a whois will typically not have all that sex stuff in it.
@FishyJoe
we have more proof from alexa...TAKE THAT
West Phoenix....are you some kind of gangster?