<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: One Man Pinged the Whole Internet</title>
	<atom:link href="http://www.epanorama.net/blog/2013/04/27/one-man-pinged-the-whole-internet/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2013/04/27/one-man-pinged-the-whole-internet/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 03 Apr 2026 21:03:02 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Age of Warring Empire Hack</title>
		<link>https://www.epanorama.net/blog/2013/04/27/one-man-pinged-the-whole-internet/comment-page-1/#comment-33833</link>
		<dc:creator><![CDATA[Age of Warring Empire Hack]]></dc:creator>
		<pubDate>Tue, 10 Dec 2013 11:54:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=19448#comment-33833</guid>
		<description><![CDATA[Greеtings from Los angeles! I&#039;m bored at work so I
deсided to check out your blog on my iphone during lunch break.
I really lіke the knowledge you provide here and сan&#039;t wait to take a look when I get home.
I&#039;m amаzed at how fast your blog loaded on my cell phone ..
I&#039;m not even using WIFI, just 3G .. Anyways, fantastic site!]]></description>
		<content:encoded><![CDATA[<p>Greеtings from Los angeles! I&#8217;m bored at work so I<br />
deсided to check out your blog on my iphone during lunch break.<br />
I really lіke the knowledge you provide here and сan&#8217;t wait to take a look when I get home.<br />
I&#8217;m amаzed at how fast your blog loaded on my cell phone ..<br />
I&#8217;m not even using WIFI, just 3G .. Anyways, fantastic site!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: shared hosting</title>
		<link>https://www.epanorama.net/blog/2013/04/27/one-man-pinged-the-whole-internet/comment-page-1/#comment-33832</link>
		<dc:creator><![CDATA[shared hosting]]></dc:creator>
		<pubDate>Mon, 26 Aug 2013 05:24:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=19448#comment-33832</guid>
		<description><![CDATA[Everything is very open with a very clear explanation of the issues.

It was really informative. Your website is
useful. Many thanks for sharing!

Here is my weblog; &lt;a href=&quot;http://Nexopia.com/users/estimatorsoccer/blog/5-appraiser-sheri-mason-to-join-kaminski-staff&quot; rel=&quot;nofollow&quot;&gt;shared hosting&lt;/a&gt;]]></description>
		<content:encoded><![CDATA[<p>Everything is very open with a very clear explanation of the issues.</p>
<p>It was really informative. Your website is<br />
useful. Many thanks for sharing!</p>
<p>Here is my weblog; <a href="http://Nexopia.com/users/estimatorsoccer/blog/5-appraiser-sheri-mason-to-join-kaminski-staff" rel="nofollow">shared hosting</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/04/27/one-man-pinged-the-whole-internet/comment-page-1/#comment-33831</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 30 May 2013 13:54:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=19448#comment-33831</guid>
		<description><![CDATA[Hacker measured the Internet, infected hundreds of devices in Finland

Especially Carna botnet Aftermath washed on. Unknown hacker polluted in the world estimated at millions of Internet connected devices, of which approximately 1.2 million are in Australian Cert authority, identifiable.

Of these, 1.2 million units in the 420 000 was used as the “Internet Census 2012″ survey-making. The hacker, therefore, mapped out the entire internet as a botnet spread during the last year.

Most of the contaminated equipment was located in China. The next highest number, but to a much lesser number of infections was, inter alia, Turkey, India, South Korea, Russia and the United States.

According to the report infections in Finland was 425 pieces

Malware infected devices are allowed to contact the telnet protocol from the public network and the default login credentials, such as admin / admin or root / password.

According to CERT-FI contaminated equipment among other things, is a broadband terminal devices connected to the Internet and digital television receivers.

The hacker’s trick was exceptional and strictly illegal in many countries. On the other hand Carna botnet is not guilty of, inter alia, traditionally understood spam or malware distribution. Or websites shutdown, as criminals often tend to do.

The hacker tried his own words, to minimize the damage

Source: http://www.digitoday.fi/tietoturva/2013/05/30/hakkeri-mittasi-internetin-tartutti-satoja-laitteita-suomessa/20137696/66?rss=6]]></description>
		<content:encoded><![CDATA[<p>Hacker measured the Internet, infected hundreds of devices in Finland</p>
<p>Especially Carna botnet Aftermath washed on. Unknown hacker polluted in the world estimated at millions of Internet connected devices, of which approximately 1.2 million are in Australian Cert authority, identifiable.</p>
<p>Of these, 1.2 million units in the 420 000 was used as the “Internet Census 2012″ survey-making. The hacker, therefore, mapped out the entire internet as a botnet spread during the last year.</p>
<p>Most of the contaminated equipment was located in China. The next highest number, but to a much lesser number of infections was, inter alia, Turkey, India, South Korea, Russia and the United States.</p>
<p>According to the report infections in Finland was 425 pieces</p>
<p>Malware infected devices are allowed to contact the telnet protocol from the public network and the default login credentials, such as admin / admin or root / password.</p>
<p>According to CERT-FI contaminated equipment among other things, is a broadband terminal devices connected to the Internet and digital television receivers.</p>
<p>The hacker’s trick was exceptional and strictly illegal in many countries. On the other hand Carna botnet is not guilty of, inter alia, traditionally understood spam or malware distribution. Or websites shutdown, as criminals often tend to do.</p>
<p>The hacker tried his own words, to minimize the damage</p>
<p>Source: <a href="http://www.digitoday.fi/tietoturva/2013/05/30/hakkeri-mittasi-internetin-tartutti-satoja-laitteita-suomessa/20137696/66?rss=6" rel="nofollow">http://www.digitoday.fi/tietoturva/2013/05/30/hakkeri-mittasi-internetin-tartutti-satoja-laitteita-suomessa/20137696/66?rss=6</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/04/27/one-man-pinged-the-whole-internet/comment-page-1/#comment-33830</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 30 May 2013 13:53:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=19448#comment-33830</guid>
		<description><![CDATA[Compromised Devices of the Carna Botnet
(also know and “Internet Census 2012″)
https://docs.google.com/file/d/0BxMgdZPXsSLBQWRIZDB0cTdGU2c/view?pli=1&amp;sle=true]]></description>
		<content:encoded><![CDATA[<p>Compromised Devices of the Carna Botnet<br />
(also know and “Internet Census 2012″)<br />
<a href="https://docs.google.com/file/d/0BxMgdZPXsSLBQWRIZDB0cTdGU2c/view?pli=1&#038;sle=true" rel="nofollow">https://docs.google.com/file/d/0BxMgdZPXsSLBQWRIZDB0cTdGU2c/view?pli=1&#038;sle=true</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/04/27/one-man-pinged-the-whole-internet/comment-page-1/#comment-33829</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 30 May 2013 13:53:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=19448#comment-33829</guid>
		<description><![CDATA[Botnet uses hacked devices to scan the internet
http://www.h-online.com/security/news/item/Botnet-uses-hacked-devices-to-scan-the-internet-1825753.html]]></description>
		<content:encoded><![CDATA[<p>Botnet uses hacked devices to scan the internet<br />
<a href="http://www.h-online.com/security/news/item/Botnet-uses-hacked-devices-to-scan-the-internet-1825753.html" rel="nofollow">http://www.h-online.com/security/news/item/Botnet-uses-hacked-devices-to-scan-the-internet-1825753.html</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: pozycjonowanie</title>
		<link>https://www.epanorama.net/blog/2013/04/27/one-man-pinged-the-whole-internet/comment-page-1/#comment-33828</link>
		<dc:creator><![CDATA[pozycjonowanie]]></dc:creator>
		<pubDate>Mon, 27 May 2013 05:48:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=19448#comment-33828</guid>
		<description><![CDATA[I am will no longer confident the best place you might be getting the info, having said that great subject matter. Need to devote some time studying much more or maybe comprehending much more. Appreciation for superb information and facts I was trying to find this info in my vision.]]></description>
		<content:encoded><![CDATA[<p>I am will no longer confident the best place you might be getting the info, having said that great subject matter. Need to devote some time studying much more or maybe comprehending much more. Appreciation for superb information and facts I was trying to find this info in my vision.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Wp signal tracker</title>
		<link>https://www.epanorama.net/blog/2013/04/27/one-man-pinged-the-whole-internet/comment-page-1/#comment-33827</link>
		<dc:creator><![CDATA[Wp signal tracker]]></dc:creator>
		<pubDate>Tue, 21 May 2013 17:40:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=19448#comment-33827</guid>
		<description><![CDATA[Thank you a bunch for sharing this with all folks you actually realize what you&#039;re speaking approximately! Bookmarked. Please also visit my website =). We can have a hyperlink exchange arrangement among us]]></description>
		<content:encoded><![CDATA[<p>Thank you a bunch for sharing this with all folks you actually realize what you&#8217;re speaking approximately! Bookmarked. Please also visit my website =). We can have a hyperlink exchange arrangement among us</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: business</title>
		<link>https://www.epanorama.net/blog/2013/04/27/one-man-pinged-the-whole-internet/comment-page-1/#comment-33826</link>
		<dc:creator><![CDATA[business]]></dc:creator>
		<pubDate>Thu, 09 May 2013 03:14:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=19448#comment-33826</guid>
		<description><![CDATA[You&#039;re so awesome! I don&#039;t believe I&#039;ve truly read through anything like that before. So nice to find another person with some original thoughts on this subject. Seriously.. thanks for starting this up. This site is one thing that is needed on the web, someone with some originality!

]]></description>
		<content:encoded><![CDATA[<p>You&#8217;re so awesome! I don&#8217;t believe I&#8217;ve truly read through anything like that before. So nice to find another person with some original thoughts on this subject. Seriously.. thanks for starting this up. This site is one thing that is needed on the web, someone with some originality!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi</title>
		<link>https://www.epanorama.net/blog/2013/04/27/one-man-pinged-the-whole-internet/comment-page-1/#comment-33825</link>
		<dc:creator><![CDATA[Tomi]]></dc:creator>
		<pubDate>Wed, 08 May 2013 05:44:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=19448#comment-33825</guid>
		<description><![CDATA[This Is the Most Detailed Picture of the Internet Ever (and Making it Was Very Illegal)
http://motherboard.vice.com/blog/this-is-most-detailed-picture-internet-ever

An anonymous researcher with a lot of time on his hands apparently shares the sentiment. In a newly published research paper, this unnamed data junkie explains how he used some stupid simple hacking techniques to build a 420,000-node botnet that helped him draw the most detailed map of the Internet known to man. Not only does it show where people are logging in, it also shows changes in traffic patterns over time with an impressive amount of precision. This is all possible, of course, because the researcher hacked into nearly half a million computers so that he could ping each one, charting the resulting paths in order to make such a complex and detailed map. Along those lines, the project has as much to do with hacking as it does with mapping.

The resultant map isn&#039;t perfect, but it is beautiful. Based on the parameter&#039;s of the researcher&#039;s study, the map is already on its way to becoming obsolete, since it shows only devices with IPv4 addresses. (The latest standard is IPv6, but IPv4 is still pretty common.) The map is further limited to Linux-based computers with a certain amount of processing power. And finally, because of the parameters of the hack, it shows some amount of bias towards naive users who don&#039;t put passwords on their computers.

The research also serves as another much-needed warning about Internet security. &quot;A lot of devices and services we have seen during our research should never be connected to the public Internet at all. As a rule of thumb, if you believe that &#039;nobody would connect that to the Internet, really nobody&#039;, there are at least 1000 people who did,&quot; says the report. &quot;Whenever you think &#039;that shouldn&#039;t be on the Internet but will probably be found a few times&#039; it&#039;s there a few hundred thousand times. Like half a million printers, or a Million Webcams, or devices that have root as a root password.&quot;]]></description>
		<content:encoded><![CDATA[<p>This Is the Most Detailed Picture of the Internet Ever (and Making it Was Very Illegal)<br />
<a href="http://motherboard.vice.com/blog/this-is-most-detailed-picture-internet-ever" rel="nofollow">http://motherboard.vice.com/blog/this-is-most-detailed-picture-internet-ever</a></p>
<p>An anonymous researcher with a lot of time on his hands apparently shares the sentiment. In a newly published research paper, this unnamed data junkie explains how he used some stupid simple hacking techniques to build a 420,000-node botnet that helped him draw the most detailed map of the Internet known to man. Not only does it show where people are logging in, it also shows changes in traffic patterns over time with an impressive amount of precision. This is all possible, of course, because the researcher hacked into nearly half a million computers so that he could ping each one, charting the resulting paths in order to make such a complex and detailed map. Along those lines, the project has as much to do with hacking as it does with mapping.</p>
<p>The resultant map isn&#8217;t perfect, but it is beautiful. Based on the parameter&#8217;s of the researcher&#8217;s study, the map is already on its way to becoming obsolete, since it shows only devices with IPv4 addresses. (The latest standard is IPv6, but IPv4 is still pretty common.) The map is further limited to Linux-based computers with a certain amount of processing power. And finally, because of the parameters of the hack, it shows some amount of bias towards naive users who don&#8217;t put passwords on their computers.</p>
<p>The research also serves as another much-needed warning about Internet security. &#8220;A lot of devices and services we have seen during our research should never be connected to the public Internet at all. As a rule of thumb, if you believe that &#8216;nobody would connect that to the Internet, really nobody&#8217;, there are at least 1000 people who did,&#8221; says the report. &#8220;Whenever you think &#8216;that shouldn&#8217;t be on the Internet but will probably be found a few times&#8217; it&#8217;s there a few hundred thousand times. Like half a million printers, or a Million Webcams, or devices that have root as a root password.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Find your Network Security Key</title>
		<link>https://www.epanorama.net/blog/2013/04/27/one-man-pinged-the-whole-internet/comment-page-1/#comment-33823</link>
		<dc:creator><![CDATA[Find your Network Security Key]]></dc:creator>
		<pubDate>Thu, 02 May 2013 02:57:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=19448#comment-33823</guid>
		<description><![CDATA[Well written. Never ever observed the topic place in this excellent way.
So pleased to have discovered this great resource.]]></description>
		<content:encoded><![CDATA[<p>Well written. Never ever observed the topic place in this excellent way.<br />
So pleased to have discovered this great resource.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
