A potpourri of interesting current events, new products, humor and just plain fun, so pull up a chair and stay a while. If your favorite post has disappeared out of sight, you can find it by selecting a category from the left hand side bar.
I am Perry Peterson, a retired auditor and tax accountant. My wife Valeta and I live along the front range of the beautiful Colorado Rocky Mountains.
Please note: some of the links in older postings on this website may have expired by the time you see them.
Many bloggers who have suffered though several days of blog outage are not happy. Many of these bloggers have lost nearly all of their readers and some, who sell on their blogs, lost their only source of income.
If we sound cynical it’s because we are.
Our blog host went on year after year (our blog began in October 2013) seemingly oblivious to the hazard of not recognizing and repairing the flaws in older Internet protocols that were not originally secured very well.
Denial of service attacks have been around for several years but this one should never have been allowed to take down many thousands of blogs for such a long period of time!
Our blog host was hit with a DDoS (distributive denial of service) outage that has kept our blog unavailable off and on (mostly off) for the last six days.
Many of the blogs are up and running. Our address ends with “blogs.com” and we were still waiting while the blogs ending with “typepad” have been up and running for a few days.
What is a denial of service attack?
Perhaps the most common method of attack involves saturating the target website with external communications requests, so much so that it cannot respond to legitimate traffic making the website unavailable.
Most of these attackers attempt to extort money from tech companies. In most case, as in the case of our blog host, the company has chosen not to give in and are fighting the attacks rather than paying the ‘ransom’ demanded.
The group responsible for this has been stopping and starting their attacks on our blog host at random intervals for the past week crippling their ability to function.
Our blog host has assured us that none of our data has been compromised and all of our photo albums remain intact and will be available for viewing, as well as all previous postings, once this attack is over.
Basecamp, Fotolia.com, GitHub and Meetup.com have joined Typepad, Livejournal and Moveable Type as victims of this latest round of malicious denial of service attacks.
These attacks are more powerful than precious attacks as the criminals are now taking advantage of flaws in older Internet protocols that were not originally secured very well.
We have been using Typepad to host our blog for ten years and five months. During that time one would think they would have anticipated a problem such as this and would have upgraded their security to prepare for an attack like this. Obviously they did not.
Typepad keeps thanking us for being patient. Most of us are not patient. We wonder how many bloggers will switch to another platform.
An encryption flaw called the Heartbleed bug has exposed a collection of popular websites, posing a potential security threat to passwords as well as credit card information. We want to assure you that this website, powered by TypePad, is not one of the websites affected.
A word from Six Apart Ltd. (6A), a software company that created TypePad blog hosting service.
The security of our bloggers is a top priority. We were able to confirm that TypePad was not vulnerable to the Heartbleed bug as soon as the bug itself was discovered, and we worked diligently to ensure that no personal information was compromised. As always, we will continue to work to protect the security of TypePad users and their data.
Sign-in requirements for posting comments on this blog have been relaxed although a “captcha” requirement has been added as shown below.
Captcha is used to prevent automated comment spam. It takes a human to respond to captcha - bots can’t do it.
In the past most of the comment spam directed at this blog was automated commercial promotions usually beginning with words such as “ we have been reading along...” or “good posting" followed by a URL hot link to a commercial web site.
Most often the links would bring up an online store selling products ranging from designer shoes to sporting equipment. Some were online sellers of products to enhance female and/or male body parts.
Any attempt to get free advertising via comment spam is prevented with the captcha requirement.
Your comments are welcome and can be posted up to two weeks after a posting first appears.