Fubar Times issue 44

Page 1

INSIDE AW SUMMIT GAELIC CON LALEXPO XBIZ CAM CON

DDoS

1


Volume 27 | Issue 4 | 2016

PUBLISHER

Jaguar Web Media

EDITOR

Julius F. Kedvessy

COPY EDITOR

Michelle Leekam

4

PROOF READER Cindy

PHOTOGRAPHERS JFK

FEATURES DDoS . . . . . . . . . . . . . . . . 24

HOSTING

National Net

CREATIVE DIRECTOR Keith Campbell

PRINTING

SHOWS 24

Get It Done Bindery

DIRECTOR OF OPERATIONS Howling Dogs Enterprises

AW SUMMIT. . . . . . . . . . . . 4

WEB COORDINATOR

GAELIC CON. . . . . . . . . . 30

Sandra J. Kane

LALEXPO . . . . . . . . . . . . . 54

Submissions cia U.S. Mail will not be returned unless requested, and accompanied by an S.A.S.E. Fubar Times reserves the right to revise any accompanied material(s) to fit editorial guidelines. Submission implies the work is original. Those submitting bear the responsibility of any copyright infringement.

XBIZ CAM CON. . . . . . . . 82

The products and services available herein are not to be purchased by minors. The articles and editorials are meant for entertainment purposes only and do not necessarily represent or reflect the opinions of Fubar Times, its affiliates and/or subsidiaries. This publisher in no way offers any recommendation, endorsement or guarantees of any kind in regard to any service, product or person advertised or mentioned within. Therefore, Fubar Times and its publishers may not be held responsible liable or responsible, in any way, for any actions ensuing from advertising. For questions and comments on this publication, please contact us at: 551 N.E. 28th Court, Pompano Beach, FL 33064.

30

54

Copyright © 2016 No part of this publication may be reproduced without the express written permission of its publisher)(s). The publisher(s) reserve the right to refuse any advertisement or submission for any reason, including, but not limited to, content or design, with no further responsibility beyond a refund or any payments made. The publisher(s) assume no responsibility for errors and/or omissions or inability to publish due to mistake or any other reason caused or suffered by themselves or their sub-contractors. Such an occurrence will not constitute a breach of any contract and the publisher(s) will be liable only for the price of the ad space ad may, at their option, run a “make good” ad of the same size in a subsequent issue. No right to discount or credit will be given. The advertiser is solely responsible for ad content and photos, and or artwork submitted for their advertisement and shall indemnify and hold harmless the publisher(s) from and against any legal actions resulting from statements, photos or artwork run in their ad due to copyright or trademark infringement, lack of proper releases, slander, libel, unfair trade practices, etc. The advertiser also assumes and takes full responsibility for keeping all records as to the age and identity of all models in submitted photos, as required by law, and providing that all models are 18 years of age or older.

82 2

To contact Fubar Times, or to send questions, comments and submissions, write to: Fubar, 551 N.E. 28th Court, Pompano Beach, FL 33064

3


AW

AW SUMMIT | 2016

AW

4

5


AW

AW SUMMIT | 2016

AW

6

7


AW

AW SUMMIT | 2016

AW

8

9


AW

AW SUMMIT | 2016

AW

10

11


AW

AW SUMMIT | 2016

12

13


AW

AW SUMMIT | 2016

AW

14

15


AW

AW SUMMIT | 2016

AW

16

17


AW SUMMIT | 2016

AW

asacp.org | Association of Sites Advocating Child Protection

ASACP needs YOUR vital help and support now! INCREASINg DEmANDS UPON ASACP SERvICES

DECREASINg INDUSTRY fINANCIAL SUPPORT

ASACP Child Exploitation Tipline — over 1 million reports to date Supporting RTA label services – billions of hits monthly to RTA labelled pages/apps Increasing demands by international governments and policy makers for industry regulation to protect children in their digital lives

Fewer industry companies to support our mission Industry consolidations Tougher industry economic challenges

Help ASACP to PROTECT CHILDREN from sexual exploitation, report child sexual exploitation crimes, protect children in their digital lives, PROTECT YOUR BUSINESS AND INDUSTRY by;

Joining ASACP as an approved member or sponsor!

Increase your level of financial support!

Donate to the ASACP Foundation!

(http://www.asacp.org/ index.php? content=donate)

Contact: tim@asacp.org We simply cannot continue to do this without YOUR criticalfinancial support now! It’s the right thing to do! ASACP is extremely grateful for the support shown by our Sponsors, Members and Donors. THANK YOU!!!

18

PLATINUM Adult Webmaster Empire • MindGeek • Epoch TITLE CCBill • Adult Centro • Southern Charms • Cam4 CORPORATE affil4you • AdamEve.com • AdultWebmasterNet • YourPaysitePartner.com • Rabbit’s Reviews • Cherry Pimps Sextronix • Dating Gold • Gamma Entertainment • OrbitalPay • GTBill, Ltd • I.M. Live • Fleshlight ABOOM • The Lions Den • Porn.com • TUBO • Limited • Sexsearch • SDC.com • Netbilling • MojoHost IN-KIND MEDIA 7 Veils • The European Summit • AVN Media Network • Cybersocket • FUBAR • XBIZ • YNOT

19


AW

AW SUMMIT | 2016

AW

20

21


AW

AW SUMMIT | 2016

AW

22

23


R

ecently the digital world was rocked by the largest distributed denial of service (DDoS) in history. The attack again DYN started at approximately 7:00AM on

10/21/16 and originated from at least one Mirai Internet of things (IoT) botnet, with Dyn originally estimating as many as 100,000 endpoints involved. There have been unverified reports published online claiming tens of millions of IP addresses were used to generate attack traffic volume that reached as high as 1.2 TBPS.

As Scott Hilton, Executive Vice President of Products at Dyn explained in a written statement online: “Early observations of the TCP attack volume from a few of our data centers indicate packet flow bursts 40 to 50 times higher than normal. This magnitude does not take into account a significant portion of traffic that never reached Dyn due to our own mitigation efforts, as well as the mitigation of upstream providers. “ The attack forced massive traffic sites including Twitter and many others to be knocked offline for extended periods of time, as Dyn (a company that prides itself on its reputation for mitigating DDoS attacks) struggled to restore normal traffic patterns. This fact pattern left many wondering, just how secure are their traffic channels and what else can be done to prevent these kinds of attacks from doing serious damage to

24

25


companies that make money moving ad revenue and sales from point A to B online every day? A group calling itself NWH too credit for this particular attack, and made matters infinitely worse by releasing the source code for the BotNet used in this DDoS attack online via github. Now it’s a matter of when copycat attacks will happen, and who will be behind them, not if they will happen or how they will be distributed. In preparing this news report for Fubar Magazine readers, we contacted several hosting companies, cybersecurity firms and high traffic websites. We also spoke with ad networks and media buyers. The one nearly universal reply we got from all of them was that we could use their comments in the article to help inform the public, but only on the condition that we did not name any of their sites or companies in the article because they did not want to bring unwanted attention to their digital properties by taunting potential attackers. What most people do not understand is that even the most robust network of sites can be brought down with a relatively inexpensive attack that turns otherwise useful devices into a nearly endless pool of distribution points echoing the same requests. All those Wi-Fi connected smoke detectors, cameras, thermostats, and home automation apparatus can be weaponized into an army of signal senders for site owners to defend against. One well-informed expert told us point blank “We recently have had DDoS greater than 60 gigabit. Historically, we haven’t been subjected to many because we have an amazing neighborhood of clients doing good business. Thankfully, we learn more with each attack. Most attacks cause no disruption to client service. The worst ones have been minimally disruptive, with the worst being about 25 minutes out of a 5-hour attack using multiple vectors. In

26

even the most robust network of sites can be brought down with a relatively inexpensive attack…


consideration of the facts, I thought we did great.

that would be fixed, and that’s something few people

Many hosts blow smoke. I think it’s best to be honest

will support. With a few exceptions a packet is a

and realistic. The new reality is these can happen to

packet. While some attacks have a specific signature

anyone or any network. All site owners should make

there are many ways to use legitimate requests as

sure they are watching emails for threats using the

your attack. This is no different than the Reddit hug

keywords “DDOS”, “attack” or “bit coin” so that they

of death, crashing a website because it got on the

don’t miss them. If you receive such a notice, discuss

front page and everyone tried to view the content. It’s

with your host and make preparations, as needed.

a DDOS attack too.”

We continue to enhance routing policies, work with carriers and expand our DDOS mitigation toolset for the benefit of our customers and network.”

As to preparedness, the answers are obvious, but they are also expensive and still remain far short of

Another well know cyber security expert who deals

being perfect. One site owner confirmed that his site

with adult brands pointed out “DDoS is now a major

“was hit pretty hard for about a week, at which point

factor in security, we deal with it on a daily basis,

our host recommended we jump onto Cloudflare

some large some small, some targeted and some just

immediately. We got signed up with the business plan

obliterating everything in its path... Luckily we have

and kept it active for a couple of months. That solved

access to many of the private secure channels where

the DDoS problem almost immediately, and after

these groups that run these fragmented packet

those first two months I just reverted the plan back

attacks hang out, which gives us a unique ability to

to a free account, which I have been at since. I would

mitigate attacks for clients direct from the source

highly recommend Cloudflare just for easy DNS

should they be affected.”

management, which comes with the free plan (and other helpful tools as well). If I were to be attacked

Anyone interested in seeing the path and intensity

directly again, I would upgrade to the business plan

of an attack should take a look at http://www.

and repeat.”

digitalattackmap.com which allows you to monitor Cyber attacks through multiple Military websites such

However others have explained that Cloudflare is far

as US CyberCom, Army Cyber Warfare operations,

from being a simple catchall solution for all DDoS

Homeland Security Cyber Security and GNSOC

attacks. In fact, several raised the possibility of

(Global Network Operations Security Command).

state sponsored attacks, and international terrorism using DDoS as a way to damage the economy of

28

The core of the problem comes from how easily an

other nations. Going a step further, one expert raised

attacker can create the attack. For starters, “there’s

awareness of the enormous financial stakes involved

always an attack vector if you have enough traffic”

with large-scale DDoS assaults. “Even if you do not

according to an experienced IT professional. “Just

want to consider the idea that it is state-sponsored,

opening a socket connection uses a resource.

look no further than pure old school unadulterated

Open enough and you’ve done the job. No payload

greed. Someone could make a lot of money using

required. Open networking requires you to trust the

large scale DDoS attacks in four easy steps... Step

requestor to some extent. Device identifiers could be

1: Wait for positive quarterly earnings, Step 2: Short

spoofed. Unless you’re advocating closed systems

those stocks, Step 3: Launch a crippling cyber attack

against those companies, Step 4: Buy a yacht and

business as usual was restored. I see DDoS attacks

cruise into international waters.”

like hurricanes, they come through and do a lot of damage but then things get rebuilt and are put back

There are many brilliant minds hard at work trying to

on track. They’ll get better at knocking things down,

solve the current crisis caused by DDoS attacks, but

but we’ll also keep improving at putting them all back

it is fair to say that there just as many brilliant minds

up better than they were before….”

competing with them as hackers continue to threaten the underpinnings of the Internet we have all become

The hurricane analogy is a poignant one. When a

increasingly reliant upon.

large storm would blow through parts of Florida once every few years it wasn’t much of a concern

There is perhaps one important silver lining worth

for most of the world. However, raise the planet’s

mentioning. “People are saying how horrible this

temperature just a few degrees and you start seeing

way, but the truth is it’s actually really good news

horrific weather patterns on a global scale. Now that

overall” said one business owner. “If people were

the DDoS storm is out of the bottle, nobody knows if

still serving data from single points, one computer

it will be an occasional day where Twitter service is

to another, an attack like this could have caused

being rained out, or if outages and ransom notices

permanent damage. The Internet actually did exactly

are about to become the new normal for large traffic

what it is intended to do, by allowing data to be

publishers and consumers world wide.

rerouted and protected until the attack died out and

29


30

31


32

33


34

35


36

37


38

39


19. - 21. June 2017 New spectacular location more panels, more party

more Ireland

40

gaelicwwwconference.com

41


42

43


44

45


46

47


48

49


50

51


52

53


54

LALEXPO LALEXPO

LALEXPO | 2016

55


56

LALEXPO LALEXPO

LALEXPO | 2016

57


58

LALEXPO LALEXPO

LALEXPO | 2016

59


60

LALEXPO LALEXPO

LALEXPO | 2016

61


62

LALEXPO LALEXPO

LALEXPO | 2016

63


64

LALEXPO LALEXPO

LALEXPO | 2016

65


66

67


68

LALEXPO LALEXPO

LALEXPO | 2016

69


70

LALEXPO LALEXPO

LALEXPO | 2016

71


72

LALEXPO LALEXPO

LALEXPO | 2016

March 23-25 2017

73


74

LALEXPO LALEXPO

LALEXPO | 2016

75


76

LALEXPO LALEXPO

LALEXPO | 2016

77


78

LALEXPO LALEXPO

LALEXPO | 2016

79


80

LALEXPO LALEXPO

LALEXPO | 2016

81


| 2016

82

83


| 2016

84

85


| 2016

86

87


| 2016

88

89


| 2016

90

91


| 2016

92

93


| 2016

94

95


Podcast • Live Streams

Inside the Industry • News

‘THE VOICES OF THE INDUSTRY’

Powered by Fubar Webmasters • contact@radio.xxx

96

www.radio.xxx


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.