Moves out to Goldstream Avenue Moves out to Goldstream Avenue

Pictures, photos and images from Victoria, BC

Upload a photo »

Showing photos 1 - 1 out of 1 in Victoria Photos

Victoria, BC - Landford is becoming a thriving community,  many residents now not having to go into Victoria at all.'s majority of staff live in Langford and it made sense to relocate the offices.

Picture of Moves out to Goldstream Avenue posted in the Victoria, BC gallery

Landford is becoming a thriving community, many residents now not having to go into Victoria at all. 's majority of staff live in Langford and it made sense to relocate the offices.

Picture posted by islandnetcom on Feb 11 '10 | See all islandnetcom photos

« Back to Victoria Forum

Since: Feb 10

Victoria, Canada

#1 Feb 11, 2010
We love it here, our previous location on Quadra and Johnson was less desirable with the offices being small and often getting tagged with grafitti, it made good business sense to move when the right offer came along and we are loving the new location.

A larger office on a main bus route with good parking an a Tim Horton and Starbucks only a stones throw away, however when possible we drink Saltspring Coffee Companies blends and enjoy hosting there website and assisting them and all of our other customers.

We are also proud sponsors of many organisations, one being the Victoria Highlanders.
Target of a DDoS Attack

Victoria, Canada

#2 May 18, 2011 was the target of a DDoS Attack but we are running again and were only down for a short period...:
By Mark Morley on Wednesday May 11 at 11:05 am
For about 40 hours was the victim of a Distributed Denial of Service (DDoS) attack.
This is the same (or similar) type of attack that took down the infamous WikiLeaks site when they released all those documents, and the attacks on Visa, MC, Amazon, and Paypal back in December. Basically, a network of infected computers (known as a "botnet") under the remote control of the "bad guys" is instructed to bombard an IP address with data packets, clogging the target's ineternet connection so much that legitimate traffic can't get through. To complicate things, the machines sending all this data can "spoof" the sender's IP address, making it appear to the target as if the attack is coming from a single innocent machine.
Steve and I have been here for over 35 hours, working with our upstream providers throughout the night to find a solution. We would manage to block an attack, only to have the attackers reconfigure and launch a new one an hour later. In the end we had to renumber all customer web sites and servers, identify and isolate the intended target, and implement a traffic scrubbing service that monitors and detects DoS attacks in real time.
We've seen no evidence of an attack for several hours now, and things are running smoothly for the most part. There is still a backlog of e-mail flowing in and out, and some customers may find they need to reboot their computers and routers so that they will learn the new IP numbers. There are a few minor glitches to do with renumbering our servers that we are cleaning up as well.
Even though it was beyond our control, we do apologize for the down time. We reacted as quickly as possible and did our best to mitigate the damage and get customers back online as soon as possible. We understand completely how frustrating something like this is, and how disruptive it is. We'd like to thank all the customers who called, emailed, tweeted, and commented on facebook with words of encouragement during these attacks.
UPDATE 3:12pm: we have been contacted by a group claiming to be behind the attacks. They identify the target (a customer of ours) and demand that the site in question be shut down or the attacks will continue. As much as I hate to capitulate, we can't afford to stand up for the rights of one customer at the expense of all the others, so the site has been shut down.
UPDATE 3:50pm: they contacted us again. They thanked us and said the attacks have been halted.
UPDATE 4:10pm: many people are curious about the content of the customer's web site that provoked the attack. While we aren't comfortable giving out too many details at this time, I will say that it was a personal "listen to my story of unjust treatment" type of blog that contained a lot of angry attacks against the perceived offenders, including numerous court judges, lawyers, etc. I'm not taking a position on the content itself, but I can see how certain parties would take offence to it.


#3 Aug 23, 2012
Honeytrap front.

Burnaby, Canada

#4 Aug 26, 2012
This is the age of cyber fraud, theft, terrorism, crime. All organizations must have their own standing armies of cyber soldiers to do battle with the enemy. Instead of only defence, perhaps organizations' cyber soldiers can go on to offence after hacker attacks? They attack you, you find them out and counter attack. Then after the counter strike is done, you civil law suit them to bankrupt them and/or send them to criminal jail. You ruthlessly crush them with all means at your disposal, shock and awe, terror and fear. Make it like a sort of public execution to warn any other would be cyber shit disturber.

Tell me when this thread is updated:

Subscribe Now Add to my Tracker

Add your comments about this photo

Characters left: 4000

Please note by submitting this form you acknowledge that you have read the Terms of Service and the comment you are posting is in compliance with such terms. Be polite. Inappropriate posts may be removed by the moderator. Send us your feedback.