a DDoS attack targets websites and servers also impact personal notebook. Netgear company or me?*更新5/13/2023
2025/05/11 15:16
瀏覽19
迴響0
推薦0
引用0
5/11/2025
searched [A DDoS attack targets websites and servers, does it also attack personal notebook?]
While DDoS attacks primarily target websites and servers, they can also indirectly impact personal notebooks, particularly if the notebook is connected to a network or online service that is being targeted. A DDoS attacks main goal is to overload a network or server with traffic, making it unavailable to legitimate users, which can include individuals using notebooks for online activities.
Heres a more detailed explanation:
Direct Impact:
A DDoS attack can disrupt扰乱 services like internet access or online accounts, which could make it difficult or impossible to use a notebook for online activities.
Indirect Impact:
If a notebook is used to access a website or service that is under attack, the notebooks performance can be affected. The notebook might experience slow loading times, connection issues, or even be unable to access the targeted website or service.
-recently i made complaints that text files typed or clicked websites buttons the response became slower and slower till 5/11/2025 connection totally broke when i tried hard to block media server/ReadyShare which i thought caused the response problem and then kicked off a weird netword [DIRECT-KaM2070 Series] in 2.4G and another hided cant see the name in 5G stick to our network 2 channels when visited router admin. obviously i can visit other websites not router admin company. the attacker very likely target at router company. did my notebook infect Botnet or DDos virus ?
--windows security > virus & threat protection click quick scan found 0 threats 13116 files scanned. then click scan options, click full scan. ---> the result is 0 threats 762678 files scanned. wonderful ! does it mean my notebook didnt infect and become part of botnet?
Botnet僵尸网络 Involvement:
Attackers often use botnets, which can include personal computers and other devices, to launch DDoS attacks. If a notebook is infected with malware and becomes part of a botnet, it could unknowingly be used to participate in a DDoS attack against other targets.
-- certainly i wont know the weird [DIRECT-KaM2070 Series] in 2.4G and another hided cant see the name in 5G are/is a victim became attacker target at me or they are the sourcce. to me just tried to find the channel has the less networks so can improve the slower and slower response then found whenever i changed channels the wird 2 always immediated stick to my selected channels. today is the worst and very obviously chases after me. other networks didnt have such sympton. did i became part of botnet without knowing?
Specific Types of Attacks:
Some types of DDoS attacks, like protocol attacks, can directly target network devices, including notebooks.
In essence本质上讲,, while a DDoS attack may not directly target a personal notebook itself, it can severely impact its usability and performance if the notebook is connected to a network or service that is being attacked.
--i believe i caught the mole hide in network issue DDoS attacking : whoever the person is use newtwork [DIRECT-KaM2070 Series] , i did sense the hacker several days and searched :[can get rid of a certain network always follow my network channel no matter what channel i changed to?] got:
Its unlikely a neighbors WiFi network can automatically follow your channel changes. If youre experiencing this, its more likely theyre intentionally mimicking模仿 your settings or there might be another issue at play.
******updated 5/11/2025
due to earlier morning got DDoS attack and router admin website broke before i changed password completely. so this morning spouse looking for old printer setup driver(to change network connection new password) and manual in company who took over previous Korean company and seeing 2070. a couple minutes ago he got a 灵机一动 the weird [DIRECT-KaM2070 Series] is our old printer related. the puzzle solved that is the reason why stick to our chnnel (not router admin advanced>wireless channel shows others WiFi).
ps 灵光一闪侧重描述灵感瞬间的闪现,强调创新性或抽象思维;灵机一动更注重实际问题的即时解决,强调灵活性与实用性
searched : [does each device has itself network name?] Yes, each device typically has its own unique network name, also known as a hostname, and a unique IP address. While multiple devices can have the same hostname on a network, its generally recommended to use unique names for clarity and to avoid potential issues with domain name resolution.
there is another issue did searh that can safely disable network adapters could increase performance and reduced virus infection. so i disabled.
searched :[disabled some network adpters does it increase DDoD attacking?] disabling adapters isnt a direct DDoS vulnerability.
it is easy to disabled(Device Manager) and i assume can restart/enable but turned out the only way is windows settings >network reset. ps better not disabled(if no start/enable) which also has bad side effects. so decide restore with high risk failed if cant remember existing settings.
Hoping set up all devices then the scary one. serached :[netgear why in network map my pc got a yellow mark within a direction arrow does it related to readyshare?] The yellow mark with a directional arrow in the Netgear network map likely indicates a network connectivity or performance issue with your PC. Its not directly related to ReadySHARE functionality, which is primarily about sharing storage. The yellow mark suggests a problem with the way your computer is connecting to the network or the routers connection to the internet.
--spouse has yutube if any poor connection happen will issue alert. daily run fast scan and weekly run full scan didnt find any bad threat. didnt match Connection Problem but might ReadySHARE settings because to kick off it thru 神操作 as: netgear admin advanced>USB storage>advanced settings: network/device name: fxxx workgroup:test (not mark) Enable but Admin password protection (marked) because cant without network/device name then click media server, media server name:fxxx. not sure whether really disabled readyshare or not. at least file explorer network didnt show readyshare related.
*************
serached: [a certain other wifi stick to our channel what is the possible cause it?]
It sounds like another WiFi network is causing co-channel interference, meaning its using the same channel as your network, leading to potential performance issues. This can happen if a nearby neighbor has their router set to the same channel, especially in densely populated areas like apartment buildings Eye Networks says.
--it is not my case. and the fix option didnt work but notebook became very slowly, now connection broke(the router admin).
what i found in router admin log as:
Description Count Last Occurrence Target Source
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53
1 Sun May 11 04:56:37 2025 149.75.231.61:57241 208.59.247.45:53
DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sun May 11 04:03:58 2025 149.75.231.61:53964 208.59.247.45:53
DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sun May 11 03:57:26 2025 149.75.231.61:60959 208.59.247.45:53
....a lot.... no wonder so slowly till broke.....
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sat May 10 18:52:30 2025 149.75.231.61:51092 208.59.247.45:53
[DoS attack: SYN Flood] from 182.61.128.141, port 443 1 Sat May 10 18:40:26 2025 192.168.0.15:59413 182.61.128.141:443
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sat May 10 18:36:11 2025 149.75.231.61:59769 208.59.247.45:53
what did the attacker want, blackmail router company or stealing victims important informations? in fact i believe i am not the only one because my network xxx was blocked so thru hidden network to login. fortunately just learnt so knwoing how to login.
should i report SSA local office or police station? i really have no confidence that the front desk knowing who is the officer deal with IT hacker type.
DDoS attacks defined
A DDoS attack targets websites and servers by disrupting network services in an attempt to exhaust an application’s resources. The perpetrators behind these attacks flood a site with errant traffic, resulting in poor website functionality or knocking it offline altogether. These types of attacks are on the rise.
--No kidding, even me can see in front of my eyes and cautght the 2 network chased my network selected channels.
DDoS attacks are wide-reaching, targeting all sorts of industries and company sizes worldwide. Certain industries, such as gaming, ecommerce电子商务, and telecommunications电信;电讯, are targeted more than others. DDoS attacks are some of the most common cyberthreats网络威胁, and they can potentially compromise达成妥协(或和解) your business, online security, sales, and reputation.
Cyberthreats是指在网络环境中对计算机系统、网络或数据进行的各种威胁和攻击,这些威胁可能来自恶意软件、病毒、勒索软件、钓鱼攻击、DDoS攻击等多种形式。这些威胁不仅会对个人用户的设备造成损害,还会对企业和组织的网络系统构成严重威胁,导致数据泄露、服务中断和财务损失等问题。
常见类型
恶意软件:包括病毒、蠕虫、特洛伊木马等,旨在破坏系统、窃取信息或进行未经授权的操作。
勒索软件:通过加密用户数据并要求支付赎金来威胁用户。
钓鱼攻击:通过伪造电子邮件或网站诱使用户提供敏感信息。
分布式拒绝服务(DDoS)攻击:通过大量请求淹没目标服务器,导致服务不可用。*****
--that exactly happened to Netgear admin company especially 5/10/2025 till 5/11/2025 website down.
高级持续性威胁(APT):长期、隐蔽地对目标进行渗透和控制,通常针对特定组织或国家。
检测和防御措施
安装防病毒软件:定期更新并运行防病毒软件,检测和清除恶意软件。
--haaaa i saw a poster installed many 检测病毒 in the end asked for help. sometimes 防病毒软件A mutual accuse the other 防病毒软件B existing 病毒. myself for 4 unknown threats deleted file explorer libraries and another i created folder which got many weird hided files .
备份数据:定期备份重要数据,以防数据被勒索软件加密。
教育用户:通过培训提高用户对钓鱼攻击和其他威胁的警惕性。
使用强密码和多因素认证:增强账户安全性,防止未经授权的访问。
网络监控和日志分析:通过监控网络流量和日志分析,及时发现异常行为。
--maybe i am 双鱼座的人 天生具有强烈的敏感(or called as 第六感) while spouse didnt feel any, and i always saw the things he cant see... i even tried to download Wi-Fi analyzer app, IP scan... but not sure they can catch network name [DIRECT-KaM2070 Series] in 2.4G and another hided cant see the name in 5G.
使用防火墙和入侵检测系统:阻止未经授权的访问,并及时响应安全事件。
--suspect they can because cell phone and other devices use auto random IP and MAC addresses which conflict to block suspicious MAC addresses.
最新趋势和技术
人工智能和机器学习:用于更准确地检测威胁和提高防御系统的效率。
零信任安全模型:强调对所有访问进行验证,不论其位置或设备类型。
云安全服务:提供基于云的安全解决方案,帮助企业更好地管理其网络安全。
物联网安全:随着物联网设备的增加,针对这些设备的安全威胁也在增加,需要特别的关注和防护措施。
ps 5/11/2025 review router admin advanced>administration> event log showed much weird as:
1970-1-1, 00:00:43 Warning (5) DHCP WARNING - Non-critical field invalid in response
1970-1-1, 00:00:41 Notice (6) Honoring MDD; IP provisioning mode = IPv4
.... 6 more dated on 1970-1-1
1970-1-1, 00:00:33 Critical (3) SYNC Timing Synchronization failure - Failed to acquire QAM/QPSK symbol timing;
--how can it be, ps 01/01/1970? what the date came from, printer device or else ?
2025-4-28, 21:21:02 Critical (3) No Ranging Response received - T3 time-out;
2025-4-28, 21:20:50 Critical (3) Received Response to Broadcast Maintenance Request, But no Unicast Maintenance opportunities received - T4 time out
2025-4-27, 09:39:38 Critical (3) Started Unicast Maintenance Ranging - No Response received - T3 time-out;
1970-1-1, 00:00:33 Critical (3) SYNC Timing Synchronization failure - Failed to acquire QAM/QPSK symbol timing
2025-4-13, 06:09:40 Critical (3) Started Unicast Maintenance Ranging - No Response received - T3 time-out
....
2025-2-19, 13:06:42 Critical (3) Started Unicast Maintenance Ranging - No Response received - T3 time-out
1970-1-1, 00:00:34 Critical (3) SYNC Timing Synchronization failure - Failed to acquire QAM/QPSK symbol timing
2025-2-18, 13:50:01 Critical (3) Started Unicast Maintenance Ranging - No Response received - T3 time-out
2025-2-18, 13:49:10 Critical (3) Started Unicast Maintenance Ranging - No Response received - T3 time-out;
--isnt very weird 1970 and 2025 mixed, so this is after DDoD attacked now became dates 错乱, the question is why the old dates instead of 5/11/2025 ?
i did made a copy of event log on 5/11/2025 2:32am which showed many DDoD attacked as:
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53
1 Sun May 11 04:56:37 2025 149.75.231.61:57241 208.59.247.45:53
DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sun May 11 04:03:58 2025 149.75.231.61:53964 208.59.247.45:53
DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sun May 11 03:57:26 2025 149.75.231.61:60959 208.59.247.45:53
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sun May 11 03:15:52 2025 149.75.231.61:51934 208.59.247.45:53
.....
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sat May 10 19:15:20 2025 149.75.231.61:65283 208.59.247.45:53
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sat May 10 19:08:01 2025 149.75.231.61:59179 208.59.247.45:53
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sat May 10 18:52:30 2025 149.75.231.61:51092 208.59.247.45:53
[DoS attack: SYN Flood] from 182.61.128.141, port 443 1 Sat May 10 18:40:26 2025 192.168.0.15:59413 182.61.128.141:443
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sat May 10 18:36:11 2025 149.75.231.61:59769 208.59.247.45:53
--you can see it recorded from 5/10/2025 18:36:11 to 5/11/2025 04:56:37 am, why my file made on 5/11/2025 2:32am , time zone caused or DDoD attacked router admin website shut down caused a mess ? i would continue monitor it till it became normal or never due to the router was expired which we just bought couple years ago.
5/13/2025 searched [what is QAM/QPSK?] got:
QAM (Quadrature Amplitude Modulation) and QPSK (Quadrature Phase Shift Keying) are both digital modulation techniques used to transmit information over wireless channels. They are closely related and used in various wireless technologies like Wi-Fi, WiMAX, and cellular networks. QAM uses both amplitude and phase modulation, while QPSK uses only phase modulation
[why router admin log showed 1970-1-1, 00:00:34 Failed to acquire QAM/QPSK symbol timing in stead 05/12/2025? what 1970-1-1 came from?]
The appearance of "1970-1-1, 00:00:34" in your routers admin log, instead of the correct date like 05/12/2025, indicates an issue with the routers internal clock and its ability to synchronize with a time server
Heres a breakdown of why this happens and what "1970-1-1" signifies:
1. The Significance of 1970-01-01 (The Unix Epoch)
In many computer systems, including routers, the default starting point for tracking time is January 1, 1970, 00:00:00 Coordinated Universal Time (UTC).
This specific date and time is known as the Unix epoch or epoch time.
When a systems clock is not set or synchronized correctly, it often defaults to this epoch time.
2. Why Your Router Might Show the Epoch Time
No Internet Connection/NTP Server Issue: Routers typically use the Network Time Protocol (NTP) to automatically synchronize their clock with a reliable time server on the internet. If your router doesnt have an active internet connection or if theres an issue with the configured NTP server, it cant update its time and might revert to the default epoch time.
Router Reset/Power Outage: If the router was recently reset to its factory settings or if there was a power outage, the clock might be reset to the default time and not yet synchronized.
Firmware Issues: In some cases, a bug or glitch in the routers firmware could lead to incorrect timekeeping.
3. QAM/QPSK Symbol Timing Errors and Time Synchronization
The error message "Failed to acquire QAM/QPSK symbol timing" is often related to issues with the modems connection to your internet service provider (ISP).
While not directly related to the routers system time, these errors can occur alongside time synchronization issues, particularly if the internet connection is unstable or if there are problems with the ISPs signal.
4. How to Resolve the Issue
Check Internet Connection: Verify that your router has a stable internet connection.
Configure NTP Settings: Access your routers settings and ensure that NTP is enabled and that a reliable NTP server is configured.
Update Router Firmware: Check for and install any available firmware updates for your router.
Check Modem Connection: If youre also experiencing modem-related errors like "Failed to acquire QAM/QPSK symbol timing," troubleshoot your modem and the connection to your ISP.
By addressing these potential causes, you should be able to resolve the time synchronization issues and ensure that your router displays the correct date and time
--it didnt make any sense that before router admin broke the log records still showing correct date ie 5/10 18:36:11pm - 5/11/2025 04:56:37 2025 Am on 5/11/2025 11:09pm i made log copy showed wrong and old dates obviously caused by DDoD 5/10/2025 22:48:35pm 22:18:18 5/11 02:05:24,02:04:49 am
attacked my notebook as:DoS attack: SYN Flood] from 159.89.242.xxx port yyySun May 11 02:05:24 2025 192.168.n.mm (our 2 notebooks IP address)
the rest many attacked as: DoS attack: TCP- or UDP-based Port Scan] from from 208.59.xxx.yy port zz
i did inform our internet provider, will the company can slove the DDoD attacking? there is no way to contact router company.
searched [A DDoS attack targets websites and servers, does it also attack personal notebook?]
While DDoS attacks primarily target websites and servers, they can also indirectly impact personal notebooks, particularly if the notebook is connected to a network or online service that is being targeted. A DDoS attacks main goal is to overload a network or server with traffic, making it unavailable to legitimate users, which can include individuals using notebooks for online activities.
Heres a more detailed explanation:
Direct Impact:
A DDoS attack can disrupt扰乱 services like internet access or online accounts, which could make it difficult or impossible to use a notebook for online activities.
Indirect Impact:
If a notebook is used to access a website or service that is under attack, the notebooks performance can be affected. The notebook might experience slow loading times, connection issues, or even be unable to access the targeted website or service.
-recently i made complaints that text files typed or clicked websites buttons the response became slower and slower till 5/11/2025 connection totally broke when i tried hard to block media server/ReadyShare which i thought caused the response problem and then kicked off a weird netword [DIRECT-KaM2070 Series] in 2.4G and another hided cant see the name in 5G stick to our network 2 channels when visited router admin. obviously i can visit other websites not router admin company. the attacker very likely target at router company. did my notebook infect Botnet or DDos virus ?
--windows security > virus & threat protection click quick scan found 0 threats 13116 files scanned. then click scan options, click full scan. ---> the result is 0 threats 762678 files scanned. wonderful ! does it mean my notebook didnt infect and become part of botnet?
Botnet僵尸网络 Involvement:
Attackers often use botnets, which can include personal computers and other devices, to launch DDoS attacks. If a notebook is infected with malware and becomes part of a botnet, it could unknowingly be used to participate in a DDoS attack against other targets.
-- certainly i wont know the weird [DIRECT-KaM2070 Series] in 2.4G and another hided cant see the name in 5G are/is a victim became attacker target at me or they are the sourcce. to me just tried to find the channel has the less networks so can improve the slower and slower response then found whenever i changed channels the wird 2 always immediated stick to my selected channels. today is the worst and very obviously chases after me. other networks didnt have such sympton. did i became part of botnet without knowing?
Specific Types of Attacks:
Some types of DDoS attacks, like protocol attacks, can directly target network devices, including notebooks.
In essence本质上讲,, while a DDoS attack may not directly target a personal notebook itself, it can severely impact its usability and performance if the notebook is connected to a network or service that is being attacked.
--i believe i caught the mole hide in network issue DDoS attacking : whoever the person is use newtwork [DIRECT-KaM2070 Series] , i did sense the hacker several days and searched :[can get rid of a certain network always follow my network channel no matter what channel i changed to?] got:
Its unlikely a neighbors WiFi network can automatically follow your channel changes. If youre experiencing this, its more likely theyre intentionally mimicking模仿 your settings or there might be another issue at play.
******updated 5/11/2025
due to earlier morning got DDoS attack and router admin website broke before i changed password completely. so this morning spouse looking for old printer setup driver(to change network connection new password) and manual in company who took over previous Korean company and seeing 2070. a couple minutes ago he got a 灵机一动 the weird [DIRECT-KaM2070 Series] is our old printer related. the puzzle solved that is the reason why stick to our chnnel (not router admin advanced>wireless channel shows others WiFi).
ps 灵光一闪侧重描述灵感瞬间的闪现,强调创新性或抽象思维;灵机一动更注重实际问题的即时解决,强调灵活性与实用性
searched : [does each device has itself network name?] Yes, each device typically has its own unique network name, also known as a hostname, and a unique IP address. While multiple devices can have the same hostname on a network, its generally recommended to use unique names for clarity and to avoid potential issues with domain name resolution.
there is another issue did searh that can safely disable network adapters could increase performance and reduced virus infection. so i disabled.
searched :[disabled some network adpters does it increase DDoD attacking?] disabling adapters isnt a direct DDoS vulnerability.
it is easy to disabled(Device Manager) and i assume can restart/enable but turned out the only way is windows settings >network reset. ps better not disabled(if no start/enable) which also has bad side effects. so decide restore with high risk failed if cant remember existing settings.
Hoping set up all devices then the scary one. serached :[netgear why in network map my pc got a yellow mark within a direction arrow does it related to readyshare?] The yellow mark with a directional arrow in the Netgear network map likely indicates a network connectivity or performance issue with your PC. Its not directly related to ReadySHARE functionality, which is primarily about sharing storage. The yellow mark suggests a problem with the way your computer is connecting to the network or the routers connection to the internet.
--spouse has yutube if any poor connection happen will issue alert. daily run fast scan and weekly run full scan didnt find any bad threat. didnt match Connection Problem but might ReadySHARE settings because to kick off it thru 神操作 as: netgear admin advanced>USB storage>advanced settings: network/device name: fxxx workgroup:test (not mark) Enable but Admin password protection (marked) because cant without network/device name then click media server, media server name:fxxx. not sure whether really disabled readyshare or not. at least file explorer network didnt show readyshare related.
*************
serached: [a certain other wifi stick to our channel what is the possible cause it?]
It sounds like another WiFi network is causing co-channel interference, meaning its using the same channel as your network, leading to potential performance issues. This can happen if a nearby neighbor has their router set to the same channel, especially in densely populated areas like apartment buildings Eye Networks says.
--it is not my case. and the fix option didnt work but notebook became very slowly, now connection broke(the router admin).
what i found in router admin log as:
Description Count Last Occurrence Target Source
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53
1 Sun May 11 04:56:37 2025 149.75.231.61:57241 208.59.247.45:53
DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sun May 11 04:03:58 2025 149.75.231.61:53964 208.59.247.45:53
DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sun May 11 03:57:26 2025 149.75.231.61:60959 208.59.247.45:53
....a lot.... no wonder so slowly till broke.....
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sat May 10 18:52:30 2025 149.75.231.61:51092 208.59.247.45:53
[DoS attack: SYN Flood] from 182.61.128.141, port 443 1 Sat May 10 18:40:26 2025 192.168.0.15:59413 182.61.128.141:443
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sat May 10 18:36:11 2025 149.75.231.61:59769 208.59.247.45:53
what did the attacker want, blackmail router company or stealing victims important informations? in fact i believe i am not the only one because my network xxx was blocked so thru hidden network to login. fortunately just learnt so knwoing how to login.
should i report SSA local office or police station? i really have no confidence that the front desk knowing who is the officer deal with IT hacker type.
DDoS attacks defined
A DDoS attack targets websites and servers by disrupting network services in an attempt to exhaust an application’s resources. The perpetrators behind these attacks flood a site with errant traffic, resulting in poor website functionality or knocking it offline altogether. These types of attacks are on the rise.
--No kidding, even me can see in front of my eyes and cautght the 2 network chased my network selected channels.
DDoS attacks are wide-reaching, targeting all sorts of industries and company sizes worldwide. Certain industries, such as gaming, ecommerce电子商务, and telecommunications电信;电讯, are targeted more than others. DDoS attacks are some of the most common cyberthreats网络威胁, and they can potentially compromise达成妥协(或和解) your business, online security, sales, and reputation.
Cyberthreats是指在网络环境中对计算机系统、网络或数据进行的各种威胁和攻击,这些威胁可能来自恶意软件、病毒、勒索软件、钓鱼攻击、DDoS攻击等多种形式。这些威胁不仅会对个人用户的设备造成损害,还会对企业和组织的网络系统构成严重威胁,导致数据泄露、服务中断和财务损失等问题。
常见类型
恶意软件:包括病毒、蠕虫、特洛伊木马等,旨在破坏系统、窃取信息或进行未经授权的操作。
勒索软件:通过加密用户数据并要求支付赎金来威胁用户。
钓鱼攻击:通过伪造电子邮件或网站诱使用户提供敏感信息。
分布式拒绝服务(DDoS)攻击:通过大量请求淹没目标服务器,导致服务不可用。*****
--that exactly happened to Netgear admin company especially 5/10/2025 till 5/11/2025 website down.
高级持续性威胁(APT):长期、隐蔽地对目标进行渗透和控制,通常针对特定组织或国家。
检测和防御措施
安装防病毒软件:定期更新并运行防病毒软件,检测和清除恶意软件。
--haaaa i saw a poster installed many 检测病毒 in the end asked for help. sometimes 防病毒软件A mutual accuse the other 防病毒软件B existing 病毒. myself for 4 unknown threats deleted file explorer libraries and another i created folder which got many weird hided files .
备份数据:定期备份重要数据,以防数据被勒索软件加密。
教育用户:通过培训提高用户对钓鱼攻击和其他威胁的警惕性。
使用强密码和多因素认证:增强账户安全性,防止未经授权的访问。
网络监控和日志分析:通过监控网络流量和日志分析,及时发现异常行为。
--maybe i am 双鱼座的人 天生具有强烈的敏感(or called as 第六感) while spouse didnt feel any, and i always saw the things he cant see... i even tried to download Wi-Fi analyzer app, IP scan... but not sure they can catch network name [DIRECT-KaM2070 Series] in 2.4G and another hided cant see the name in 5G.
使用防火墙和入侵检测系统:阻止未经授权的访问,并及时响应安全事件。
--suspect they can because cell phone and other devices use auto random IP and MAC addresses which conflict to block suspicious MAC addresses.
最新趋势和技术
人工智能和机器学习:用于更准确地检测威胁和提高防御系统的效率。
零信任安全模型:强调对所有访问进行验证,不论其位置或设备类型。
云安全服务:提供基于云的安全解决方案,帮助企业更好地管理其网络安全。
物联网安全:随着物联网设备的增加,针对这些设备的安全威胁也在增加,需要特别的关注和防护措施。
ps 5/11/2025 review router admin advanced>administration> event log showed much weird as:
1970-1-1, 00:00:43 Warning (5) DHCP WARNING - Non-critical field invalid in response
1970-1-1, 00:00:41 Notice (6) Honoring MDD; IP provisioning mode = IPv4
.... 6 more dated on 1970-1-1
1970-1-1, 00:00:33 Critical (3) SYNC Timing Synchronization failure - Failed to acquire QAM/QPSK symbol timing;
--how can it be, ps 01/01/1970? what the date came from, printer device or else ?
2025-4-28, 21:21:02 Critical (3) No Ranging Response received - T3 time-out;
2025-4-28, 21:20:50 Critical (3) Received Response to Broadcast Maintenance Request, But no Unicast Maintenance opportunities received - T4 time out
2025-4-27, 09:39:38 Critical (3) Started Unicast Maintenance Ranging - No Response received - T3 time-out;
1970-1-1, 00:00:33 Critical (3) SYNC Timing Synchronization failure - Failed to acquire QAM/QPSK symbol timing
2025-4-13, 06:09:40 Critical (3) Started Unicast Maintenance Ranging - No Response received - T3 time-out
....
2025-2-19, 13:06:42 Critical (3) Started Unicast Maintenance Ranging - No Response received - T3 time-out
1970-1-1, 00:00:34 Critical (3) SYNC Timing Synchronization failure - Failed to acquire QAM/QPSK symbol timing
2025-2-18, 13:50:01 Critical (3) Started Unicast Maintenance Ranging - No Response received - T3 time-out
2025-2-18, 13:49:10 Critical (3) Started Unicast Maintenance Ranging - No Response received - T3 time-out;
--isnt very weird 1970 and 2025 mixed, so this is after DDoD attacked now became dates 错乱, the question is why the old dates instead of 5/11/2025 ?
i did made a copy of event log on 5/11/2025 2:32am which showed many DDoD attacked as:
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53
1 Sun May 11 04:56:37 2025 149.75.231.61:57241 208.59.247.45:53
DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sun May 11 04:03:58 2025 149.75.231.61:53964 208.59.247.45:53
DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sun May 11 03:57:26 2025 149.75.231.61:60959 208.59.247.45:53
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sun May 11 03:15:52 2025 149.75.231.61:51934 208.59.247.45:53
.....
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sat May 10 19:15:20 2025 149.75.231.61:65283 208.59.247.45:53
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sat May 10 19:08:01 2025 149.75.231.61:59179 208.59.247.45:53
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sat May 10 18:52:30 2025 149.75.231.61:51092 208.59.247.45:53
[DoS attack: SYN Flood] from 182.61.128.141, port 443 1 Sat May 10 18:40:26 2025 192.168.0.15:59413 182.61.128.141:443
[DoS attack: TCP- or UDP-based Port Scan] from 208.59.247.45, port 53 1 Sat May 10 18:36:11 2025 149.75.231.61:59769 208.59.247.45:53
--you can see it recorded from 5/10/2025 18:36:11 to 5/11/2025 04:56:37 am, why my file made on 5/11/2025 2:32am , time zone caused or DDoD attacked router admin website shut down caused a mess ? i would continue monitor it till it became normal or never due to the router was expired which we just bought couple years ago.
5/13/2025 searched [what is QAM/QPSK?] got:
QAM (Quadrature Amplitude Modulation) and QPSK (Quadrature Phase Shift Keying) are both digital modulation techniques used to transmit information over wireless channels. They are closely related and used in various wireless technologies like Wi-Fi, WiMAX, and cellular networks. QAM uses both amplitude and phase modulation, while QPSK uses only phase modulation
[why router admin log showed 1970-1-1, 00:00:34 Failed to acquire QAM/QPSK symbol timing in stead 05/12/2025? what 1970-1-1 came from?]
The appearance of "1970-1-1, 00:00:34" in your routers admin log, instead of the correct date like 05/12/2025, indicates an issue with the routers internal clock and its ability to synchronize with a time server
Heres a breakdown of why this happens and what "1970-1-1" signifies:
1. The Significance of 1970-01-01 (The Unix Epoch)
In many computer systems, including routers, the default starting point for tracking time is January 1, 1970, 00:00:00 Coordinated Universal Time (UTC).
This specific date and time is known as the Unix epoch or epoch time.
When a systems clock is not set or synchronized correctly, it often defaults to this epoch time.
2. Why Your Router Might Show the Epoch Time
No Internet Connection/NTP Server Issue: Routers typically use the Network Time Protocol (NTP) to automatically synchronize their clock with a reliable time server on the internet. If your router doesnt have an active internet connection or if theres an issue with the configured NTP server, it cant update its time and might revert to the default epoch time.
Router Reset/Power Outage: If the router was recently reset to its factory settings or if there was a power outage, the clock might be reset to the default time and not yet synchronized.
Firmware Issues: In some cases, a bug or glitch in the routers firmware could lead to incorrect timekeeping.
3. QAM/QPSK Symbol Timing Errors and Time Synchronization
The error message "Failed to acquire QAM/QPSK symbol timing" is often related to issues with the modems connection to your internet service provider (ISP).
While not directly related to the routers system time, these errors can occur alongside time synchronization issues, particularly if the internet connection is unstable or if there are problems with the ISPs signal.
4. How to Resolve the Issue
Check Internet Connection: Verify that your router has a stable internet connection.
Configure NTP Settings: Access your routers settings and ensure that NTP is enabled and that a reliable NTP server is configured.
Update Router Firmware: Check for and install any available firmware updates for your router.
Check Modem Connection: If youre also experiencing modem-related errors like "Failed to acquire QAM/QPSK symbol timing," troubleshoot your modem and the connection to your ISP.
By addressing these potential causes, you should be able to resolve the time synchronization issues and ensure that your router displays the correct date and time
--it didnt make any sense that before router admin broke the log records still showing correct date ie 5/10 18:36:11pm - 5/11/2025 04:56:37 2025 Am on 5/11/2025 11:09pm i made log copy showed wrong and old dates obviously caused by DDoD 5/10/2025 22:48:35pm 22:18:18 5/11 02:05:24,02:04:49 am
attacked my notebook as:DoS attack: SYN Flood] from 159.89.242.xxx port yyySun May 11 02:05:24 2025 192.168.n.mm (our 2 notebooks IP address)
the rest many attacked as: DoS attack: TCP- or UDP-based Port Scan] from from 208.59.xxx.yy port zz
i did inform our internet provider, will the company can slove the DDoD attacking? there is no way to contact router company.
自訂分類:中国
上一則: 涉嫌在驻韩美军基地擅拍战机,两名台湾人被抓--美军此次禁止来自特定国家和地区的外籍人员出入 ie 中国台湾 no matter how hard 台独 deny they were not 中国人 下一則: solved cell phone(iOS over 15 version) weird random MAC address puzzle; Dual band router (2.4G/5G), MS Network WiFi xxx properties and router admin MAC address
限會員,要發表迴響,請先登入