Join Akamai’s State of the Internet Report Webinar on 17th December

Akamai, the leader in Content Delivery Network earlier had released its State of the Internet Report with details about the health of the internet, traffic details based on various states and countries and also had categorised the internet traffic into various categories like attack traffic, traffic for news site, retail traffic etc. Akamai is now organizing a Webinar to discuss the state of the internet.

Akamai State of Internet

Image:Akamai State of Internet

Are you concerned about how Internet outages and related problems impact your customers’ ability to access your online business? Have you secured your Web sites against Denial of Service attacks? Do you factor in broadband adoption rates as you look to optimize performance of your online operations on a global scale?

Join Akamai, the market leader in managed services for powering rich media, dynamic transactions, and enterprise applications online, as they discuss the state of the Internet and its impact on the online industry. 

During this Webinar, David Belson, Director of Market Intelligence at Akamai, will lead an interactive discussion providing insights into:

Broadband Adoption Trends

Impact On Adoption of HD Video

Vulnerabilities in Core Internet Protocols

Attack Traffic Trends

Online Data Visualization Tools

When will this webinar take place?

This webinar will take place on December 17th 2008 and there will be two sessions: 7:30 pm Indian Standard Time (9.00 am EST) and 11:30 pm Indian Standard Time (1.00 pm EST)

How Much will this Event Cost?

This is a FREE event. There is no charge. Click here to register.

If you have any other questions regarding this webinar, do drop me a line and i will get back to you with an answer.

You can also follow me on Twitter at

Do stay tuned to Technofriends for more, one of the best ways of doing so is by subscribing to our feeds. You can subscribe to Technofriends feed by clicking here.


Understanding TCP Connection Basics.

During a TCP connection, their are 6 TCP flags which are set in the packets which are transported to the target computer from the source computer. These flags indicate the state of the packet.

Valid values for the flags are

SYN -- Initial Request, sent by the source.
ACK -- Acknowledgement to the initial request. Sent by the target confirming the receipt of SYN.

FIN -- Finish Request.

URG -- Urgent Request.

PSH -- Push Request.

RST -- Reset. 

The combination of these above mentioned flags sets the control connection session at various times.

The real implementation of these flags starts from the very time a source computer tries to establish a session with a target computer.

The process flow for the same goes as mentioned below

1.) Source Computer sends a SYN request.

2.) Target computer, upon the receipt of a SYN request, sends back a SYN-ACK request/response. 

3.) Source computer again sends back an ACK message to the target computer. This confirms the connection.

TCP-Connection basics

TCP-Connection basics

The above mentioned process is known as a 3-Way handshake process for TCP connections. 

Now, while at this topic, lets also take up the importance of these flags and the TCP communication basics to see if an alteration in the flag setting can lead to a Denial of Service (DoS) for the Web application. 

Lets assume a scenario where in a malicious machine is only sending SYN packets for the connections and has been configured to not send any ACK flag. 

1.) Source computer sends a SYN request to the target computer. 

2.) Target computer responds back with a SYN-ACK. 

3.) Source computer instead of sending ACK, sends back a SYN request. 

Understanding How modifying TCP flags can lead to DoS attack

Understanding How modifying TCP flags can lead to DoS attack

The above process leads to the scenario wherein the target computer always opens up a new connection upon the receipt of SYN request, allocates specific memory for the connection and keeps the memory allocated till the connection times out. This may lead to a situation wherein the target computer runs out of the memory pool and denies any further connections. This is called Denial of Service.

Also read: Understanding NULL Session Attacks

Hacking Ruby on Rails

Learn to Hack )

Serial Numbers and CD Keys of Softwares brought to you by Google.

[How-To] Bypassing Passwords in Windows

You can follow me on Twitter at

Do stay tuned to Technofriends for more, one of the best ways of doing so is by subscribing to our feeds. You can subscribe to Technofriends feed by clicking here.


Vaibhav Pandey