Twitter Hit by Denial-Of-Service Attack

The popular social networking site Twitter has been hit by a denial of service attack, according to Twitter co-founder Biz Stone. In an e-mail to CNN.com, Stone said this morning’s attack is not related to a recent incident in which a hacker stole internal documents from the site.

“There’s no indication that this attack is related to any previous activities. We are currently the target of a denial of service attack,” Stone said in the e-mail. Approximately 45 million people worldwide now rely on Twitter as a communication platform, and a number of them will be greatly inconvenienced.

Denial-of-service attacks are a common weapon employed by cyber criminals to disrupt the working of Web sites. Perpetrators enlist millions of computers to attempt to access a particular site. The site cannot handle the massive increase in traffic, and is rendered inaccessible.

While disruptive and hard to trace, this type of cyber attack is considered by experts to be a relatively unsophisticated technique. The attack itself doesn’t attempt to infiltrate the internal operations of a company’s computer infrastructure. It simply renders its Web site inactive.

Twitter’s status update said: “We are defending against a denial-of-service attack, and will update status again shortly.” The millions of Twitter fans who have been disrupted by this attack will no doubt give vent over the next few days. I confidently expect to see Twitter and Denial-Of-Service at the top of the Google hit chart shortly!

For more on the CNN story Click Here to visit CNN Money

To follow me on Twitter when it is back up, Click on BGT666

Twitter May face lawsuit in US Court

The popular Social Networking site Twitter is being sued by TechRadium, a Texas-based firm that developed a mass notification and emergency response service that delivers messages to multiple contacts simultaneously. TechRadium has filed a lawsuit in a US district court against Twitter for infringing three of its patents, alleging that the patent it holds for its IRIS (Immediate Response Information System) emergency notification system is being infringed upon by Twitter.

The IRIS system seems to be capable of notifying large numbers of people simultaneously, via different media in a way similar to microblogging sites. Micro blogging is a form of multimedia blogging that allows users to send brief text updates or micromedia such as photos or audio clips and publish them, either to be viewed by anyone or by a restricted group which can be chosen by the user. These messages can be submitted by a variety of means, including text messaging, instant messaging, email, digital audio or the web. Twitter are not the only site capable of doing this, so perhaps the defence lawyers will be able to cite common practice or public domain.

The lawsuit, filed on Tuesday in the US District Court for the Southern District of Texas, Houston Division, seeks among other things unspecified damages, recovery of attorneys’ fees and a permanent injunction against Twitter. Is it me, or does it seem that when ever something really obvious gets to be successful, and have mass market appeal, then the lawyers start lining up for a piece of the action. I confidently predict that someone who has patented a content management system will be filing against WordPress shortly.

TechCo Training Demo Sites

If you are attending one of our training events or seminars, and want to view the sites listed in the demonstration, than this is the place to look.

Get a Free WordPress Blog at WordPress.com

If you want to check out WordPress for yourself, why not sign up for a free WordPress Blog at WordPress.com. There are some restrictions, but you can customise the theme and get blogging in minutes.

Just follow the simple steps below to set up your blog

  • Fill in the Username, Password, Email Address and agree to the fascinating terms of service
  • Fill in your domain name .wordpress.com/
  • Activate your blog by clicking on the link in the confirmation email

Check out the sample sites below

Some of the restriction of the free site are listed below

  • No Remote Publishing
  • No Post via e-mail
  • No Editing Update Services
  • Can not change the Permalink Settings
  • No Miscellaneous Settings

Business Card Web site
A business card Web site enables you to establish a Web presence for your company. It can contain basic information about your company, such as name, logo, a brief description, its location, contact information (e-mail, phone number, and fax, for example), and any other information about your business that you may want to add to the Web site.

You can either host your company Web site through your Internet service provider (ISP), through a hosting provider, or if you are running Microsoft® Windows® Small Business Server 2003, you could host the site on the Server. If you are planning to host the site yourself, you need to have registered an Internet domain name (for example, techcosupport.com) to access services on your server from the Internet.

KISS Demo
Click here for a sample site

Is Conficker the start of the biggest botnet in history?

Conficker worm infected machines may comprise one of the biggest networks of robot computers (botnets) in Internet history if security experts’ fears are proved correct. From midnight on 1 April, the Conficker program will start scanning thousands of websites for a new set of instructions telling it what to do next.

Conficker – also known among security experts as “Downadup” was first discovered in November last year, being sold as part of a kit by a Chinese hacker. Since then, two variants have been spotted in the wild as the virus has gone on to infect more than 10m PCs.

Microsoft has offered a bounty of $250,000 (£176,000) for the identity of Conficker’s creator, who currently remains unknown. Usual methods of unpacking the virus code to examine its workings have been thwarted because the authors have encrypted it, using algorithms that render it almost uncrackable.

For more aspects of this story see Conficker virus – deadly threat or April Fool’s joke

NAO slams IT project’s rising costs

The National Audit Office has slammed plans for a multi-million pound central database of offenders that failed because of poor management and a lack of budget control. The spending watchdog said the abandoned IT project’s rising costs and delays could have been avoided if basic management rules had been followed.

Edward Leigh MP, chairman of the Public Accounts Committee, described C-NOMIS as a “spectacular failure” and commented “What they delivered was a master class in sloppy project management.”

Harry Fletcher, assistant general secretary of probation officers union Napo, said the programme had been “a scandalous misuse of taxpayers’ money”.

For more information on this report see BBC News

Increasing the File Upload Size on IIS

Last week a user reported a problem with a file upload on our Intranet which has otherwise performed flawlessly for years. They browsed to the file and selected it as normal, but when they clicked upload “nothing happened”. This is an in-house developed Content Management System, written in classic ASP, and the user is a competent content manager, so user issues did not seem likely. At first we suspected file permissions, as there had been some moving around of directories by system support, but this usually results in a 500 error to IE users with Friendly Errors turned on.

Eventually through perseverance by the user it was determined that files greater than 200 Kbytes would fail, but smaller files would upload OK. At last something to Google!

It turns out that by default Windows 2008 server limits file uploads to 200KB in size. To overcome this limit you must edit the ASP Setting as follows:

Increasing the File Upload Size on IIS

  1. Login to your server
  2. Open Up IIS Manager
  3. Click on ASP
  4. Expand the Limits properties
  5. Change the default 200KB for the helpfully named Maximum Requesting Entity Body Limit to the required value.

Once you have saved that change the upload limit will increase for all the websites on that server. Remember, if you are running clustered servers you need to increase this value on each server in the cluster.

This support tip first appeared on TechCo Training site under the title IIS File Upload Problems

Check out The Fabulous Website Chick

We came across this site the other day while browsing a bulletin board, and were very impressed. It deserves an award just for the shear pinkness of it’s WordPress theme, but there is some interesting content and useful Internet marketing tips too. It just shows what you can do with WordPress and some imagination. For a dazzeling look at the pink side of life visit The Fabulous Website Chick, but beware, you might need your shades!

Successful Development with Agile Methodologies

The term Agile is one of the buzz words in the Business Analysis press at the moment. Agile methodologies promote a project management process that encourages frequent inspection and adaptation. It uses a leadership philosophy that encourages teamwork, self-organization and accountability, and a set of engineering best practices that allow for rapid delivery of high-quality software. It encourages a business approach that aligns development with customer needs and company goals. One flavor of Agile is Extreme Programming which is sometimes affectionately known as XP.

The main aim of Extreme Programming is to reduce the cost of change by introducing basic values, principles and practices to a system development project. Proponents of Extreme Programming and Agile Methodologies in general, regard ongoing changes to requirements as a natural and desirable aspect of software development projects.

In Extreme Programming the level of customer satisfaction depends on the Extreme Programming cycle, which is sometimes known as “the circle of life”:

  • the customer decides which features have value,
  • programmers estimate the cost of providing the features,
  • the customer chooses the best combination of features based on value and cost,
  • programmers build the features, learning how to estimate costs in the process,
  • the customer learns how to define value and how to make effective choices.

This is highly effective, and when both parties are fully engaged, then both sides benefit. The trouble with this win-win virtuous cycle occurs if you have an intermediary between the business and the developers, or one party who has not fully engaged.

If you place an intermediary such as an analyst between the customer and the developers, then the third party gets all the benefit. The best results occur if the Business Analyst acts as a facilitator to enable the interaction. This lets the developers see and feel the urgency and need, and to understand what the users really want. The users understand the level of complexity of any underlying modeling and so are able to assess relative value of features. The Business Analyst learns from both parties and is able to translate terminology on the spot, or illuminate areas which lack clarity. One such meeting, lasting an hour or so can save weeks of Use Case building and requirements documentation in traditional system development methods.

In the situation where one party has not fully engaged, the problem is of a different caliber. Often the customer lacks engagement because they have seen Agile as a way to save themselves time and expense with documentation. This can occur if an evangelist for an Agile methodology gives high abstraction level feedback for a successful project, often in a throwaway comment, in a social situation. This is really a high risk situation, and one to be avoided at all costs. It is the Project Manager’s responsibility to ensure that business owners do not see use of an Agile methodology as a way to save costs by eliminating documentation. If she fails to ensure engagement, such project will inevitably suffer from cost overrun, mission creep and even failure when the deliverables do not meet the needs of the users.

The way to ensure a successful development project is to have sufficient capacity in the disciplines of Business Analysis and Project Management to ensure that the lessons are learned and both parties remain engaged. By applying Extreme Programming, a system development project will be more flexible with respect to changes, and will meet the needs of the users when it is live. By having close engagement between the business users and the developers, the customer learns how to define value and how to make effective choices, and the programmers learn how to estimate costs. If this is all kept in-house then the business keeps all the benefits.

Although Extreme Programming itself is relatively new, many of its practices have been around for some time. The methodology simply takes best practices to extreme levels. However it is not an excuse to avoid engagement in a project or omit documentation. Its strength lies in the rapid time to market, and the acceptance that change is inevitable. Its weakness lies in its attractiveness to budget slashers who do not understand or fully embrace the methodology, or misguided evangelists who believe that by putting the users in with the programmers you can cut out the Business Analysts and Project Manager.

The benefits of Extreme Programming and Agile Methodologies are self evident to their supporters, who can show you any number of successful projects, completed on time and within budget. The detractors can enumerate the risks and point to projects which have over-run or gone of the rails through lack of discipline. In reality, they are both right, because in life we get what we look for.

The responsibility of the Project Manager is to ensure that we focus is success, and use the right methodology for the situation. The Business Analyst is the facilitator to enable the interaction between the customer and the developers, and so deliver the successful product. Customers will see success by embracing change and allowing Agile development teams to work with users for rapid delivery of high-quality software, using a business approach that aligns development with customer needs and company goals.

Bruce Thompson

Webmaster of The Institution of Analysts and Programmers, Bruce Thompson is a PRINCE2 Practitioner and active Agile evangelist for more than 10 years. He has delivered a number of successful projects using DSDM and Extreme Programming.

For further information on Agile see the Wikipedia entry for Agile Software Development
For more information on analysts in the loop see Business Analysis in Extreme Programming by Ron Jeffries
If you are in Business Analysis, Project Management or Agile Software Development and are interested in joining like minded individuals, visit The Institution of Analysts and Programmers website

Ray Kurzweil appointed head of new school for futurologists

American inventor Ray Kurzweil has been appointed head of a new school for futurologists backed by Google and the US space agency Nasa. He will become chancellor of the Singularity University based at Nasa’s Silicon Valley campus in California.

The institution gains its name from a controversial 2005 book by Kurzweil, entitled The Singularity is Near. In it, he argues that the exponential advance of technology is set to transform society by giving rise to computers that are more clever than humans. He claims that the leap in computing power will drive rapid advances in other fields which could solve the problems of climate change, poverty, famine and disease.

Ray Kurzweil, who worked as a computer scientist before turning to future gazing in the late 1980s, first coined the concept of nanobots which could work inside the human body repairing damage as the go. This would be combined with the use of biotechnology to unravel the ageing process and for the nanotechnology eventually to be capable of slowing it down and ultimately reversing it. He predicted that within 15 years that human life expectancy would start to increases at a rate faster than you age. The first step involves adopting a good enough diet and exercise regime to live long enough for the technology to catch up. At least that part wont hurt!

Click here to visit the Singularity University site

Help End Leprosy Now!

A new site has been launched to help in the fight to end Leprosy. It is called End Leprosy Now!

Public ignorance and fear mean that attitudes towards former Leprosy sufferers and those close to them remain unchanged; they are excluded from schools and workplaces, unable to find or keep marriage partners, and widely shunned by communities. Many are disabled, most are forced into poverty. There is no other illness whose sufferers continue to face such stigmatisation even after they have been cured.

25 January 2009 has been designated World Leprosy Day. This site has been initiated now, in the lead up to World Leprosy Day 2009, to revitalise and reenergise the efforts to eradicate this disfiguring disease. Why not visit End Leprosy Now and see if you can help.

Click here to visit and help End Leprosy Now!