Breaking the fast Friday night was both exciting and anticlimactic. I decided on having Pollo Asado using Cornish game hens rather than chicken. I marinated a Cornish Game hen in salt, adobe seasonings, Mexican oregano, achiote sauce, water, orange, pineapple, lime and lemon juice for 24 hours. I then grilled it along with lightly oiled and seasoned red onion wedges, split jalapenos, quartered tomatoes, and sliced bell peppers. I made a fresh guacamole and then created an achiote cream sauce. It was delicious but I couldn’t eat more than a leg before feeling full. I force down a few bites of the vegetables before calling dinner done. Saturday, I ground a porterhouse steak and made hamburgers with Belgian fries and sea salt. After a quarter of the burger and a few fries, I called it a meal again. Clearly, breaking the fast was going to take longer than I thought. Sunday morning I made fresh biscuits, sausage and eggs. I amazed myself when I finished one biscuit, one sausage and one egg. The fast was finally, broken. For dinner, I made chicken pate and gnocchi with chicken livers and cream sauce. So, with all of that, what is the recipe of the week? I suggest the Gnocchi, Chicken Livers and Cream Sauce. Enjoy! By the way, I did taste the pollo asado before going to bed Sunday night and in a word, excellent!
It is difficult to explain to customers that they are vulnerable to denial of service (DoS) attacks. Due to the both the architecture and technology of the PSTN, there is no such thing as DoS attacks. However, for the exact same reason, service providers and customers are potential victims of DoS attacks. In the simplest of terms DoS attack is an assault on a network or network element which attempts to prevent the usage of all or part of the network. A DoS attack targets equipment, users, organizations data centers and networks. Compared to hacking into a service provider network or penetrating an enterprise strength firewall, DoS attacks are simple to execute. The most obvious and most used attack is to overwhelm the targets resources so that it can no longer properly function. These types of attacks are prevented by having more computing power than the attacker. Hence, the development of the latest bit of mischievous bordering on malicious intent. The attacker, as in the case of Wikileaks, solicits other people to allow software to be launched from their PCs to attack a central target. This is a distributed denial of service (DDoS) attack. It is also accomplished when a Trojan horse or worm compromises a number of systems. This coordinated attack is very difficult to prevent or overcome as the computing power is directly related to number and types of compromised systems.
Every year Broadvox faces DoS attacks. Every year we expand security, authentication rules and processing capacity to overcome them. Every year our VARs are confused as how we are vulnerable to such attacks. Perhaps, they should think of it this way. In the world of the PSTN, there is one day when the network was expected to be overwhelmed, Mother’s Day. The cost to prevent service interruptions on Mother’s Day exceeded the benefit to the service provider. Similarly, the cost to enhance every network element, every process and every customer connection is prohibitive to prevent every DDoS attack. Therefore, how the network reacts is important. Elimination is the overall goal but minimizing the duration and number of affected customers is an achievable goal. Prepare your customers IT infrastructure and IP PBXs for DoS attacks and improve their VoIP/SIP Trunking experience.