https://archive.ph/dx9dc
https://web.archive.org/web/20210701161622/https://threadreaderapp.com/thread/1410598212503621635.html
Despite Shi’s lies that it was “taken down in February 2020 due to hacking attempts”, and whining of hardline zoonati activists, Msis record of the WIV Batvirus database does not indicate evidence of “the database was still accessible in 02/2020”.
In order to understand the detail on how Msis monitor the uptime of a database, there are two hurdles one must overcome to access any database stored on any server: The server must first respond to the connection attempt, and Then the database itself must be set to accessible on the server and the connection must be authorized by the server before the database itself is given access to by the server.
https://archive.ph/rFUMP
https://archive.ph/WHRTL
The Msis system uses “连接成功” “连接失败” and “连接等待” to classify how a database is accessible—this means that it Pings the IP address of the database server and wait for a response. If the Ping was responded to, then the connection is considered successful. If the Ping show “rejected” or “destination host unreachable”, then it says “connection failed”. If the Ping show “request timed out” or if a response to the ping request was not received, then it says “Connection wait” or “连接等待”.
https://web.archive.org/web/20211208164243/https://threadreaderapp.com/thread/1463101306994708483.html
Unfortunately, Ping requests like this only show if the server was still plugged in and if the IP address was still reachable—in order to see if the database was accessed at all, the “download stats” of the database must be shown. Only when access become granted to a connection and valid interaction with the database has happened, will a download access be recorded. With no download access, what can easily happen is that while the server was still connectable, accessing the database return only “403 Forbidden”, a custom error page, or an empty ftp page such as if you attempt to access removed data from CNGBDB. Another thing that can be set on such servers is that you can set a website or IP address to redirect to a default page if access was attempted to a link on the server that is no longer available. This can be either the homepage of the institution or a more detailed page such as “页面没有找到,将在x秒钟后带您返回网站首页!” as if you are to access an already scrubbed or invalid link on the WIV’s home page. https://archive.ph/9iZP3
This will still register as “连接成功” on the msis system, especially if the link then redirects to a valid non-error code webpage, as if you are trying to access any page that does not exist on the WIV’s official website.
Ultimately, all the claims of “post-pandemic takedown” “from hacking attempts” was belied by the fact that the Batvirus database have never been copied over or re-uploaded on a secure location anywhere in the world—a read-only copy of the database is not in danger of hacking, and is extremely beneficial to origin science. However, such a database was never re-uploaded, indicating that there is in deed incriminating content within the WIV batvirus database.
https://archive.ph/5xOd2
https://archive.ph/9MNVZ
What the download and hit stats show: No Access to the database itself were ever granted and the server have begun to simply redirecting access attempts to other locations (Normal Ping to the server, no authorization for database access for external connections) at 13/09/2019.
@gdemaneuf
Maybe this is why they have to “hack the database” that ultimately leads to the entire server being unplugged from the internet? (If you need the database but the server won’t grant you access to it, but you found that you can still connect to the server itself, what you will do?)
https://web.archive.org/web/20210701161622/https://threadreaderapp.com/thread/1410598212503621635.html
Despite Shi’s lies that it was “taken down in February 2020 due to hacking attempts”, and whining of hardline zoonati activists, Msis record of the WIV Batvirus database does not indicate evidence of “the database was still accessible in 02/2020”.
In order to understand the detail on how Msis monitor the uptime of a database, there are two hurdles one must overcome to access any database stored on any server: The server must first respond to the connection attempt, and Then the database itself must be set to accessible on the server and the connection must be authorized by the server before the database itself is given access to by the server.
https://archive.ph/rFUMP
https://archive.ph/WHRTL
The Msis system uses “连接成功” “连接失败” and “连接等待” to classify how a database is accessible—this means that it Pings the IP address of the database server and wait for a response. If the Ping was responded to, then the connection is considered successful. If the Ping show “rejected” or “destination host unreachable”, then it says “connection failed”. If the Ping show “request timed out” or if a response to the ping request was not received, then it says “Connection wait” or “连接等待”.
https://web.archive.org/web/20211208164243/https://threadreaderapp.com/thread/1463101306994708483.html
Unfortunately, Ping requests like this only show if the server was still plugged in and if the IP address was still reachable—in order to see if the database was accessed at all, the “download stats” of the database must be shown. Only when access become granted to a connection and valid interaction with the database has happened, will a download access be recorded. With no download access, what can easily happen is that while the server was still connectable, accessing the database return only “403 Forbidden”, a custom error page, or an empty ftp page such as if you attempt to access removed data from CNGBDB. Another thing that can be set on such servers is that you can set a website or IP address to redirect to a default page if access was attempted to a link on the server that is no longer available. This can be either the homepage of the institution or a more detailed page such as “页面没有找到,将在x秒钟后带您返回网站首页!” as if you are to access an already scrubbed or invalid link on the WIV’s home page. https://archive.ph/9iZP3
This will still register as “连接成功” on the msis system, especially if the link then redirects to a valid non-error code webpage, as if you are trying to access any page that does not exist on the WIV’s official website.
Ultimately, all the claims of “post-pandemic takedown” “from hacking attempts” was belied by the fact that the Batvirus database have never been copied over or re-uploaded on a secure location anywhere in the world—a read-only copy of the database is not in danger of hacking, and is extremely beneficial to origin science. However, such a database was never re-uploaded, indicating that there is in deed incriminating content within the WIV batvirus database.
https://archive.ph/5xOd2
https://archive.ph/9MNVZ
What the download and hit stats show: No Access to the database itself were ever granted and the server have begun to simply redirecting access attempts to other locations (Normal Ping to the server, no authorization for database access for external connections) at 13/09/2019.
@gdemaneuf
Maybe this is why they have to “hack the database” that ultimately leads to the entire server being unplugged from the internet? (If you need the database but the server won’t grant you access to it, but you found that you can still connect to the server itself, what you will do?)
Write a comment...
Sort by