올림픽공원

집이 올림픽공원 북2문과 아주 가까워서, 자주 올림픽공원을 찾게 된다. 뉴욕의 센트럴파크보다는 못하지만 집 근처에 이런 근사한 공원이 있다는게 너무 고맙다.


사용자 삽입 이미지
사용자 삽입 이미지
사용자 삽입 이미지광장에 새로 생긴 시푸드 레스토랑. 밖에서 보기에는 근사해 보이던데.

사용자 삽입 이미지평화의 광장

사용자 삽입 이미지
사용자 삽입 이미지엄지 손가락.1988 세자르

사용자 삽입 이미지

호동이 열차

사용자 삽입 이미지

4륜 자전거 대여료: 3인승(1시간:15,000원, 30분: 10,000원),
6인승(1시간: 25,000원, 30분: 15,000원)

사용자 삽입 이미지 

물놀이. 평일에는 20분에 3천원, 주말에는 10분에 3천원.
 

구글도 로봇을 싫어하는군…

구글도 로봇이 날리는 검색에 대해서는 방어를 하고 있다..


The reason behind the “We’re sorry…” message



Some of you might have seen this message while searching on Google, and wondered what the reason behind it might be. Instead of search results, Google displays the “We’re sorry” message when we detect anomalous queries from your network. As a regular user, it is possible to answer a CAPTCHA – a reverse Turing test meant to establish that we are talking to a human user – and to continue searching. However, automated processes such as worms would have a much harder time solving the CAPTCHA. Several things can trigger the sorry message. Often it’s due to infected computers or DSL routers that proxy search traffic through your network – this may be at home or even at a workplace where one or more computers might be infected. Overly aggressive SEO ranking tools may trigger this message, too. In other cases, we have seen self-propagating worms that use Google search to identify vulnerable web servers on the Internet and then exploit them. The exploited systems in turn then search Google for more vulnerable web servers and so on.  This can lead to a noticeable increase in search queries and sorry is one of our mechanisms to deal with this.

At ACM WORM 2006, we published a paper on Search Worms [PDF] that takes a much closer look at this phenomenon. Santy, one of the search worms we analyzed, looks for remote-execution vulnerabilities in the popular phpBB2 web application. In addition to exhibiting worm like propagation patterns, Santy also installs a botnet client as a payload that connects the compromised web server to an IRC channel. Adversaries can then remotely control the compromised web servers and use them for DDoS attacks, spam or phishing. Over time, the adversaries have realized that even though a botnet consisting of web servers provides a lot of aggregate bandwidth, they can increase leverage by changing the content on the compromised web servers to infect visitors and in turn join the computers of compromised visitors into much larger botnets. This fundamental change from remote attack to client based download of malware formed the basis of the research presented in our first post. In retrospect, it is interesting to see how two seemingly unrelated problems are tightly connected.


출처: http://googleonlinesecurity.blogspot.com/2007/07/reason-behind-were-sorry-message.html

싸이월드는 어떻게 될까?

나는 일하면서 뮤클캐스트를 많이 듣는다. 어제 뮤클캐스트 듣는데 어느 CJ가 “아직도 싸이월드 하세요?” 란 얘기를 했다. 적잖이 놀랏다. 일반적인 얘기는 아닐테지만 그래도 싸이월드가 이런 얘기를 들을 지경까지 되다니… 혹시나 아이러브스쿨 꼴이 되지는 않을런지..