New Posts
  • Hi there guest! Welcome to PoliticalJack.com. Register for free to join our community?

Pages loading slow on PoliticalJack?

SW48

Administrator
Staff member
Supporting Member
Give me some feedback today on the speed or lack of here at PolitcalJack. We hadn't had any issues until this week and the host company says they don't see a problem.

I need to get to the bottom of whats going on.

DW
 

Addy

Rebuild With Biden!
Weird as it sounds, when certain posters, (their names I don't won't to reveal), are logged on -- my pages on PJ open much slower.
I don't have any ads on my page except for the Newsmax ads.
 

Jen

Senator
Weird as it sounds, when certain posters, (their names I don't won't to reveal), are logged on -- my pages on PJ open much slower.
I don't have any ads on my page except for the Newsmax ads.
I wonder if that could have any bearing on it.
I stay logged on all the time when my computer is on so I know it must not be me.
 

Addy

Rebuild With Biden!
I wonder if that could have any bearing on it.
I stay logged on all the time when my computer is on so I know it must not be me.
I don't know, just felt like it was worth mentioning. I had noticed quite some time ago 'the speed change' on the PJ site when certain posters are logged on.

Easy to pick up a virus on a site like this, or any social media sites. Have to wonder sometimes if users keep their security updated.
 

bdtex

Administrator
Staff member
Give me some feedback today on the speed or lack of here at PolitcalJack. We hadn't had any issues until this week and the host company says they don't see a problem.

I need to get to the bottom of whats going on.

DW
That's strange. There's been some posts about that in the "mojo" thread. I have a Motorola Droid Maxx cellphone,an iPad mini,a Toshiba laptop and an Acer desktop. My mobile provider is Verizon. My home provider is Comcast and my officer provider is Logix. I've done nothing to my cellphone since I bought it in May. My iPad came with Safari and I downloaded Google Chrome to it. I haven't downloaded any additional anti-virus/popup blocker programs to either other than what they came with and I can't tell you what they may have come with. I downloaded Webroot antivirus software on my laptop and desktop. I use Google Chrome on all of my devices. I get no ads in PJ on any of them other than the NewsMax ad and I've not experienced any of the technical problems others are posting about. As a matter of fact,it's been quite awhile since I've experienced any technical issues on this site.
 

SW48

Administrator
Staff member
Supporting Member
My pages are zooming right along now!! Wonder why? ;)
It comes and goes. I think its the shared server but hostgator won't admit it.

As far as viruses you can't get a virus from another user and the site cannot be slowed down by another user.
 

Addy

Rebuild With Biden!
Sorry, SW.. but it happens, do a search, easy to find the affirmation.
Just one I clicked on at random.
-------------------
Why target social networking sites? That's an easy one to answer. You don't have to be a computer whiz to use any of the social networking sites. They're designed to be deliberately easy-to-use for; so much so that people of any age can use social networking sites. That's their big attraction.

Unfortunately that means that the same people who don't believe in computer viruses, trojans, spyware or firewalls will quite happily click on whatever link you put in front of them. Even if the link tells them it's about some video footage that one of their friends just "found"... This doesn't happen in real life but of course all you have to do is put that blue hyperlink in front of them and they'll click like mad to get at this hidden video footage or pictures of them. It makes you wonder what kind of guilty consciences some people might have!
So the virus authors now know that social networking users are highly suggestible. Put a tempting link in front of them and they're very, very likely to click it and spread the virus further.

In the last few weeks I've seen people who I thought were pretty smart click on these links and riddle their systems with various types of computer virus. Most of the social networking viruses are a type of worm designed to spread via your address book. The payload varies from one to the next. Usually though it winds up with the operating system having to be fully reinstalled from scratch. Several small companies I know have had serious IT issues because of virus infections caused by viruses spread via social networking sites.

Does this mean that social networking sites should be banned full stop? Punishing everyone for the sins of a few has never been a good idea. What needs to happen is more training on Internet security issues for employers and employees alike. Explain to the people/staff the cost and employment implications of a widescale virus infection - it can close a business down.

Then again some people never learn so totally blocking all forms of social networking sites in the workplace will probably have to become common practice - for the safety and security of everyone involved.
http://www.articlesbase.com/internet-articles/social-networks-computer-virus-playground-669629.html
It comes and goes. I think its the shared server but hostgator won't admit it.

As far as viruses you can't get a virus from another user and the site cannot be slowed down by another user.
 

SW48

Administrator
Staff member
Supporting Member
You are 100% correct. You can get a virus by clicking on a link.

The previous poster was saying that users were giving out viruses and slowing down the forum just by being logged in.

They can only give you a virus if you click on something that has a virus.
 

Addy

Rebuild With Biden!
It's possible for users/hacks with computer savvy to gain control of another person's computer, well known fact.
 

Addy

Rebuild With Biden!
Worth reading.. much more on the link.
---------------------------------
What is Hacking?
The term hacking initially referred to the process of finding solutions to rather technical issues or problems. These days, hacking refers to the process whereby intruders maliciously attempt to compromise the security of corporate networks to destroy, interpret, or steal confidential data or to prevent an organization from operating.

Terminologies that refer to criminal hacking:

  • Cracking
  • Cybercrime
  • Cyberespionage
  • Phreaking
To access a network system, the intruder (hacker) performs a number of activities:

  • Footprinting: This is basically the initial step in hacking a corporate network. Here the intruder attempts to gain as much information on the targeted network by using sources that the public can access. The aim of footprinting is to create a map of the network to determine what operating systems, applications, and address ranges are being utilized and to identify any accessible open ports.
    The methods used to footprint a network are:

    • Access information publicly available on the company website to gain any useful information.
    • Try to find any anonymous File Transfer Protocol (FTP) sites and intranet sites that are not secured.
    • Gather information on the company’s domain name and the IP address block being used.
    • Test for hosts in the network’s IP address block. Tools such as Ping or Flping are typically used.
    • Using tools such as Nslookup, the intruder attempts to perform Domain Name System (DNS) zone transfers.
    • A tool such as Nmap is used to find out what the operating systems are that are being used.
    • Tools such as Tracert are used to find routers and to collect subnet information.
  • Port scanning: Port scanning or scanning is when intruders collect information on the network services on a target network. Here, the intruder attempts to find open ports on the target system.
    The different scanning methods that network attackers use are:

    • Vanilla scan/SYNC scan: TCP SYN packets are sent to each address port in an attempt to connect to all ports. Port numbers 0 – 65,535 are utilized.
    • Strobe scan: Here, the attacker attempts to connect to a specific range of ports that are typically open on Windows based hosts or UNIX/Linux based hosts.
    • Sweep: A large set of IP addresses are scanned in an attempt to detect a system that has one open port.
    • Passive scan: Here, all network traffic entering or leaving the network is captured and traffic is then analyzed to determine what the open ports are on the hosts within the network.
    • User Datagram Protocol (UDP) scan: Empty UDP packets are sent to the different ports of a set of addresses to determine how the operating responds. Closed UDP ports respond with the Port Unreachable message when any empty UDP packets are received. Other operating systems respond with the Internet Control Message Protocol (ICMP) error packet.
    • FTP bounce: To hide the attacker’s location, the scan is initiated from an intermediary File Transfer Protocol (FTP) server.
    • FIN scan: TCP FIN packets that specify that the sender wants to close a TCP session are sent to each port for a range of IP addresses.
  • Enumeration: The unauthorized intruder uses a number of methods to collect information on applications and hosts on the network and on the user accounts utilized on the network. Enumeration is particularly successful in networks that contain unprotected network resources and services:
    • Network services that are running but are not being utilized.
    • Default user accounts that have no passwords specified.
    • Guest accounts that are active.
  • Acquiring access: Access attacks are performed when an attacker exploits a security weakness so that he/she can obtain access to a system or the network. Trojan horses and password hacking programs are typically used to obtain system access. When access is obtained, the intruder is able to modify or delete data and add, modify, or remove network resources.
    The different types of access attacks are:

    • Unauthorized system access entails the practice of exploiting the vulnerabilities of operating systems or executing a script or a hacking program to obtain access to a system.
    • Unauthorized privilege escalation is a frequent type of attack. Privilege escalation occurs when an intruder attempts to obtain a high level of access, like administrative privileges, to gain control of the network system.
    • Unauthorized data manipulation involves interpreting, altering, and deleting confidential data.
  • Privilege escalation: When an attacker initially gains access to the network, low level accounts are typically used. Privilege escalation occurs when an attacker escalates his/her privileges to obtain a higher level of access, like administrative privileges, in order to gain control of the network system.
    The privilege escalation methods that attackers use are:

    • The attacker searches the registry keys for password information.
    • The attacker can search documents for information on administrative privileges.
    • The attacker can execute a password cracking tool on targeted user accounts.
    • The attacker can use a Trojan in an attempt to obtain the credentials of a user account that has administrative privileges.
  • Install backdoors: A hacker can also implement a mechanism such as some form of access granting code with the intent of using it at some future stage. Attackers typically install back doors so that they can easily access the system at some later date. After a system is compromised, users can remove any installed backdoors by reinstalling the system from a backup that is secure.
  • Removing evidence of activities: Attackers typically attempt to remove all evidence of their activities.
What are Hackers or Network Attackers?
A hacker or network attacker is someone who maliciously attacks networks, systems, computers, and applications and captures, corrupts, modifies, steals, or deletes confidential company information.

A hacker can refer to a number of different individuals who perform activities aimed at hacking systems and networks and it can also refer to individuals who perform activities that have nothing to do with criminal activity:

  • Programmers who hack complex technical problems to come up with solutions.
  • Script kiddies who use readily available tools on the Internet to hack into systems.
  • Criminal hackers who steal or destroy company data.
  • Protesting activists who deny access to specific Web sites as part of their protesting strategy.
Hackers these days are classified according to the hat they wear. This concept is illustrated below:

  • Black hat hackers are malicious or criminal hackers who hack at systems and computers to damage data or who attempt to prevent businesses from rendering their services. Some black hat hackers simply hack security protected systems to gain prestige in the hacking community.
  • White hat hackers are legitimate security experts who are trying to expose security vulnerabilities in operating system platforms. White hat hackers have the improvement of security as their motive. They do not damage or steal company data nor do they seek any fame. These security experts are usually quite knowledgeable about the hacking methods that black hat hackers use.
  • Grey hat hacker: These are individuals who have motives between that of black hat hackers and white hat hackers.
http://www.tech-faq.com/network-attacks.html
 

oicu812

"Trust, but Verify"
yesterday i did a complete system scan, checked all maleware/virus updates, driver updates, and 122 microsoft problem/fixit scans....nothing...there were no problems on my end, nor at any of the sites i tried..all fine..when i come here,,,one ad causes the problem [none right now] and when i investigated further, i got the message "long running feed is causing internet explorer to shut down,,it will now close the program to protect your computer"....the only ad that causes this is the "off" bug repellant ad..i ran a check on the feed from that ad and its like dialup...1lpm...no other ads/sites etc. do this..
 

Addy

Rebuild With Biden!
Pages still loading slowly here, SW. It has been this way all week. I'm wondering if anyone else is experiencing the same problem. Thanks.
 

bdtex

Administrator
Staff member
Pages still loading slowly here, SW. It has been this way all week. I'm wondering if anyone else is experiencing the same problem. Thanks.
I've been experiencing that problem the past few days.
 

SW48

Administrator
Staff member
Supporting Member
I've been experiencing that problem the past few days.
This morning even before your post I updated the open "slowness" trouble ticket with Hostgator and talked to my programmer I hired specifically for this problem over two weeks ago.

I am beyond frustrated. The slowness comes and goes. Yesterday around 3 PM eastern when I posted it was fine, no slow down.

This morning when I get my alerts or post a reply its very slow. When I click on someone elses post or thread to read its fine.
 

Jen

Senator
This morning even before your post I updated the open "slowness" trouble ticket with Hostgator and talked to my programmer I hired specifically for this problem over two weeks ago.

I am beyond frustrated. The slowness comes and goes. Yesterday around 3 PM eastern when I posted it was fine, no slow down.

This morning when I get my alerts or post a reply its very slow. When I click on someone elses post or thread to read its fine.
Same here. I clicked "respond" and it was quick. But when I opened this post, I could have gone and done something else while I waited.

I know it's as frustrating for you as it is for us.
If I ever leave it won't be because of this......and I hope other posters feel the same.
Hang in there.
 

Wahbooz

Governor
Glad to know I'm not the only one. Sometimes they load quickly, and other times I could grow mold waiting.
 
  • Like
Reactions: Jen
Top