Uganda Clays Limited (UCL.ug) listed on the Uganda Securities Exchange under the Building & Associated sector has released it’s 2008 annual report.For more information about Uganda Clays Limited (UCL.ug) reports, abridged reports, interim earnings results and earnings presentations, visit the Uganda Clays Limited (UCL.ug) company page on AfricanFinancials.Document: Uganda Clays Limited (UCL.ug) 2008 annual report.Company ProfileUganda Clays Limited manufactures and markets clay products for the building and construction industry in Uganda. Its product offering ranges from roofing tiles, bricks and floor tiles to decorative grilles, ventilators, pipes and suspended floor units and partition blocks. The company supplies the local building trade in Uganda and exports products to Kenya, Tanzania, Burundi, Rwanda, the DRC and South Sudan. Uganda Clays Limited was founded in 1950 and its head office is in Kampala, Uganda. Uganda Clays Limited is listed on the Uganda Securities Exchange
text / Gu Xiaobo
the afternoon of January 21st nationwide the emergence of Internet access failure, a large number of domain names including Baidu, Tencent, Sina, was hijacked, the accident lasted a few hours, became a nationwide Internet disaster.
is similar to the scale of the accident is not common, why the scope of such a wide range of reasons why can not be restored in a short time? Why the Chinese Internet easily hijacked?
after multi consultation, NetEase technology trying to use plain language to restore the event.
DNS why so fragile?
The full name of DNS
Domain Name System (domain name system), user input domain name through DNS analysis to the corresponding IP address, domain name will be the first local DNS server to resolve, if not to return analysis, the upper server until the query to the root server to query the most advanced, the local server will be the IP cache again, the user access to the domain name will return to the cached IP.
this is the root of the DNS server, referring to a total of 13 sets of the world’s root DNS server, is responsible for recording the corresponding suffix of the top-level domain name server.
in the case of DNS contamination, the domain name can be resolved to the non site corresponding to the IP, so hijacked to the 220.127.116.11.
It is understood that
DNS, the last update specification in 1987, after almost no change, that is to say, the current DNS standard is 27 years ago, although the root server is the highest level of protection, but still possible because of political differences, domain name management causes large fault, so without paralysis the end.
since read from the local DNS, why would be hijacked?
as mentioned above, when the user access to a domain name, the operator’s recursive DNS will deal with it, thereby easing the pressure on the root DNS.
recursive DNS refers to a domain name to IP address cache, and the default that this relationship will not change over a period of time, but it will have a buffer time, usually one hour, every hour will be superior to the recursive DNS DNS to request a IP, so the final effect DNS attack will spread to the recursive DNS, which affects every user.
when the user on the computer to the network connection DNS set to 18.104.22.168 (foreign DNS), visit the site will not be resolved from the recursive DNS, so you can avoid the pollution problem.
who is the culprit?
, a security industry source said, hackers want to turn off the recursive DNS server is almost impossible