It’s not lag mate you can actually see the missiles flying around in space all converge and hit at once.
my friend this missile have max flight time of 14s… then you can use math to calculate further
this is his normal behaviour
- to make 15 hits he need 15x5s= 75s, but max flight time of missile is 14s, so lets say he can make in theory only 2-3 hits , and all get down in same time
lol
May i ask, what professional DDoS protection you are using?
still having differing effects with different toons, 3 toons in same system 1 toon showing completely different info in local to the other 2. Am in the UK
atm, tranquility is not working at all?
its called downtime…
LOOOOOL, wasnt looking at clock haha, i picked perfet time for logging in haha
I am not interested in the information on this DDoS attacks. I need the server to work well and get my damn ship back. Six days support does not respond. You can not return the ship, return its value in ISKis. I do not want to wait anymore. Bad job CCP.
Hmm… Exactly what the DDOSer would say if he wanted to stir the pot some more…
Come on man, you’d be pissed too if it happened to you, I know I’d be pissed.
Hell, just waiting for a reply on a regular Support Ticket is irritating.
SUGGESTION: Ye might want to look into a company name change. Somehow I doubt this is all done by players. It may just be targetted because of the acronym.
I am pissed at stuff happening to me - I’m just not bitching about it on the forums, as I know it’s not CCP’s fault.
SUGGESTION: Ye might want to look into a company name change. Somehow I doubt all the attacks are by players. The acronym may be the target.
Still trying to log in with my omega char, I wasnt able in all day …, I ve an alpha too and he seems to be able to log without problems.
PS: I m trying to connect from Spain dont know if it worths mentioning
How exactly does a ddos manage to screw with that?
But we are.
We don’t care about what you need or want. This is a conversation to keep in your support tickets.
No.
As I see it, probably because the Omega/Alpha status is recognized by the Authentification Server at some point, which might get impacted.
All’s good in the states. No server issues at all. Other than sometimes it seems things don’t target as fast and I have to push the button a couple of times to have it work… Completely new so… not sure if that’s normal or not. Started in April this year.
Why am I afraid of…
Sorry, the last thing that came to my mind, what I found useful was the shared bookmarks. The rest just nerf nerf nerf nerf, buff other, nerf. Petty stuff, red dot… It’s my personal opinion, of course.
Connection is good in Alaska.
Some of the error messages I was seeing are raising specters of the past. Back in 2009, before I ever met EVE, I was working as a contractor for a client I shall not name, and I developed a flexible SNMP facility that could connect through a port and set up a management facility according to a function passed to it. While double-checking the SNMP protocols I ran into a wonderful tutorial on SNMP, but it happened to be in a USPTO archive which ended with a business methods patent claim on any software simplifying SNMP. I did advise the client of the patent existence and I was directed to cease work on the software I had finished and tested. When the contract was done, I asked permission to release that facility into Free Software, and I was told I could do so as long as I made no mention of the client. I never released, but that doesn’t mean that other employees of the client did not. The source was in Python 2.6.
It occurs to me that specific socket attacks might work very well with a port and a malicious attack function passed to the facility I wrote. I wrote it for passing testing functions to computers with a hook to pass results back to a central monitor, using any port, and there was even a facility to monitor ports. I had not reviewed the code in a while, but when I did… (Shudders). It would have been ideal to find the ports frequently used by compromising one windows EVE client somewhere. There was even an .msi to install python and the software in the packages I made, because my client used a lot of windows computers, roughly 2 million of them. I never wrote that software to be used in attacks, but in retrospect, it could have been used exactly for that. It was designed to work as a Net-SNMP sub-agent, but the specifics of contact were easily accessible and well-commented because the folk handling the Net-SNMP install for that client were talking about changing when I was coding.
It means that ordinary system monitoring software could have been used with one compromised EVE client to design a very sophisticated attack on the ports EVE uses, and most of the work has been done. I am sure my efforts are not unique. Probably many automated sub-agent setups have been coded in various computer languages, but perhaps the hunt for attackers could be assisted by looking for SNMP traps? (Traps are network monitoring messages in SNMP lingo).