{"id":869,"date":"2011-08-03T15:23:39","date_gmt":"2011-08-03T15:23:39","guid":{"rendered":"https:\/\/galsys.co.uk\/news\/?p=869"},"modified":"2018-05-08T10:44:01","modified_gmt":"2018-05-08T10:44:01","slug":"hackers-and-time-servers","status":"publish","type":"post","link":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/","title":{"rendered":"Hackers and Time Servers"},"content":{"rendered":"<p>Computer hacking is a common subject in the news. Some of the biggest companies have fallen victim to hackers, and for a myriad of reasons. <a href=\"https:\/\/www.galsys.co.uk\">Protecting computer networks from invasion<\/a> from malicious users is an expensive and sophisticated industry as hackers use many methods to invade a system.<\/p>\n<p>Various forms of security exist to defend against unauthorised access to computer networks such as antivirus software and firewalls.<\/p>\n<p>One area often overlooked, however, is where a computer network gets it source of time from, which can often be a vulnerable aspect to a network and a way in for hackers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1750 alignleft\" src=\"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/nts-6001-server-front-300x67.jpg\" alt=\"\" width=\"300\" height=\"67\" \/>Most computer networks use <a href=\"https:\/\/www.ntp.org\">NTP <\/a>(Network Time Protocol) as a method of keeping synchronised. NTP is excellent at keeping computers at the same time, often to within a few milliseconds, but is dependent on a single source of time.<\/p>\n<p>Because computer networks from different organisations need to communicate together, having the same source of time makes sense, which is the reason most computer networks synchronise to a source of UTC (Coordinated Universal Time).<\/p>\n<p>UTC, the world\u2019s global timescale, is kept true by <a href=\"https:\/\/www.atomic-clock.galleon.eu.com\/\">atomic clocks<\/a> and various methods of utilising UTC are available.<\/p>\n<p>Quite often, computer networks use an internet time source to obtain UTC but this is often when they run into security issues.<\/p>\n<p>Using internet time sources leave a computer network open to several vulnerabilities. Firstly, to allow access to the internet time source, a port needs keeping open in the system firewall (UDP 123). As with any open port, unauthorised users could take advantage of this, using the open port as a way into the network.<\/p>\n<p>Secondly, if the internet time source itself if tampered with, such as by BGP injection (Border Gateway Protocol) this could lead to all sorts of problems. By telling internet time servers it was a different time or date, major havoc could ensue with data getting lost, system crashes\u2014a type of Y2K effect!<\/p>\n<p>Finally, internet time servers can\u2019t be authenticated by NTP and can also be inaccurate. Vulnerable to latency and affected to distance, errors can also occur; earlier this year some reputable time servers lost several minutes, leading to thousands of computer networks receiving the wrong time.<\/p>\n<p>To ensure complete protection, dedicated and external time servers, such as<a href=\"https:\/\/www.galsys.co.uk\/ntp-servers\/nts-6001-gps-ntp-server.html\"> Galleon\u2019s NTS 6001<\/a> are the only secure method of receiving UTC. Using GPS (or a radio transmission) an external <a href=\"https:\/\/www.ntp-time-server.com\">NTP time server<\/a> can\u2019t be manipulated by malicious users, is accurate to a few milliseconds, can\u2019t drift and is not susceptible to timing errors.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer hacking is a common subject in the news. Some of the biggest companies have fallen victim to hackers, and for a myriad of reasons. Protecting computer networks from invasion from malicious users is an expensive and sophisticated industry as hackers use many methods to invade a system. Various forms of security exist to defend&hellip;<\/p>\n<p><a class=\"btn btn-primary\" href=\"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/\">Continue reading <i class=\"fas fa-arrow-right\"><\/i><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,124,9,12],"tags":[16,25,29,206],"class_list":["post-869","post","type-post","status-publish","format-standard","hentry","category-atomic-clocks","category-ntp-security","category-ntp-server-2","category-time-server","tag-atomic-clock","tag-network-time-server","tag-ntp-servers","tag-time-synchronisation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers and Time Servers - Galleon Systems<\/title>\n<meta name=\"description\" content=\"See how time servers are affected by hacking\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers and Time Servers - Galleon Systems\" \/>\n<meta property=\"og:description\" content=\"See how time servers are affected by hacking\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"Galleon Systems\" \/>\n<meta property=\"article:published_time\" content=\"2011-08-03T15:23:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-08T10:44:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/nts-6001-server-front-300x67.jpg\" \/>\n<meta name=\"author\" content=\"Richard N Williams\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@galleonsystems\" \/>\n<meta name=\"twitter:site\" content=\"@GalleonSystems\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Richard N Williams\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/hackers-and-time-servers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/hackers-and-time-servers\\\/\"},\"author\":{\"name\":\"Richard N Williams\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/#\\\/schema\\\/person\\\/38013a1dcb0021026d59957e276aa3cd\"},\"headline\":\"Hackers and Time Servers\",\"datePublished\":\"2011-08-03T15:23:39+00:00\",\"dateModified\":\"2018-05-08T10:44:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/hackers-and-time-servers\\\/\"},\"wordCount\":428,\"image\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/hackers-and-time-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/wp-content\\\/uploads\\\/nts-6001-server-front-300x67.jpg\",\"keywords\":[\"atomic clock\",\"network time server\",\"ntp servers\",\"Time Synchronisation\"],\"articleSection\":[\"atomic clocks\",\"ntp security\",\"ntp server\",\"time server\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/hackers-and-time-servers\\\/\",\"url\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/hackers-and-time-servers\\\/\",\"name\":\"Hackers and Time Servers - Galleon Systems\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/hackers-and-time-servers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/hackers-and-time-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/wp-content\\\/uploads\\\/nts-6001-server-front-300x67.jpg\",\"datePublished\":\"2011-08-03T15:23:39+00:00\",\"dateModified\":\"2018-05-08T10:44:01+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/#\\\/schema\\\/person\\\/38013a1dcb0021026d59957e276aa3cd\"},\"description\":\"See how time servers are affected by hacking\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/hackers-and-time-servers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/hackers-and-time-servers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/hackers-and-time-servers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/wp-content\\\/uploads\\\/nts-6001-server-front-300x67.jpg\",\"contentUrl\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/wp-content\\\/uploads\\\/nts-6001-server-front-300x67.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/hackers-and-time-servers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers and Time Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/\",\"name\":\"Galleon Systems\",\"description\":\"Sales: 0121 608 7230\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/#\\\/schema\\\/person\\\/38013a1dcb0021026d59957e276aa3cd\",\"name\":\"Richard N Williams\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/01862680879ba669edd67af1e800a1061bb93933cf7fe58c48043fb7d52911bc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/01862680879ba669edd67af1e800a1061bb93933cf7fe58c48043fb7d52911bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/01862680879ba669edd67af1e800a1061bb93933cf7fe58c48043fb7d52911bc?s=96&d=mm&r=g\",\"caption\":\"Richard N Williams\"},\"description\":\"Richard N Williams is a technical author and a specialist in the NTP Server and Time Synchronisation industry.\",\"sameAs\":[\"https:\\\/\\\/x.com\\\/galleonsystems\"],\"url\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers and Time Servers - Galleon Systems","description":"See how time servers are affected by hacking","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/","og_locale":"en_US","og_type":"article","og_title":"Hackers and Time Servers - Galleon Systems","og_description":"See how time servers are affected by hacking","og_url":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/","og_site_name":"Galleon Systems","article_published_time":"2011-08-03T15:23:39+00:00","article_modified_time":"2018-05-08T10:44:01+00:00","og_image":[{"url":"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/nts-6001-server-front-300x67.jpg","type":"","width":"","height":""}],"author":"Richard N Williams","twitter_card":"summary_large_image","twitter_creator":"@galleonsystems","twitter_site":"@GalleonSystems","twitter_misc":{"Written by":"Richard N Williams","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/#article","isPartOf":{"@id":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/"},"author":{"name":"Richard N Williams","@id":"https:\/\/www.galsys.co.uk\/news\/#\/schema\/person\/38013a1dcb0021026d59957e276aa3cd"},"headline":"Hackers and Time Servers","datePublished":"2011-08-03T15:23:39+00:00","dateModified":"2018-05-08T10:44:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/"},"wordCount":428,"image":{"@id":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/nts-6001-server-front-300x67.jpg","keywords":["atomic clock","network time server","ntp servers","Time Synchronisation"],"articleSection":["atomic clocks","ntp security","ntp server","time server"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/","url":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/","name":"Hackers and Time Servers - Galleon Systems","isPartOf":{"@id":"https:\/\/www.galsys.co.uk\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/nts-6001-server-front-300x67.jpg","datePublished":"2011-08-03T15:23:39+00:00","dateModified":"2018-05-08T10:44:01+00:00","author":{"@id":"https:\/\/www.galsys.co.uk\/news\/#\/schema\/person\/38013a1dcb0021026d59957e276aa3cd"},"description":"See how time servers are affected by hacking","breadcrumb":{"@id":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/#primaryimage","url":"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/nts-6001-server-front-300x67.jpg","contentUrl":"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/nts-6001-server-front-300x67.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.galsys.co.uk\/news\/hackers-and-time-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.galsys.co.uk\/news\/"},{"@type":"ListItem","position":2,"name":"Hackers and Time Servers"}]},{"@type":"WebSite","@id":"https:\/\/www.galsys.co.uk\/news\/#website","url":"https:\/\/www.galsys.co.uk\/news\/","name":"Galleon Systems","description":"Sales: 0121 608 7230","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.galsys.co.uk\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.galsys.co.uk\/news\/#\/schema\/person\/38013a1dcb0021026d59957e276aa3cd","name":"Richard N Williams","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/01862680879ba669edd67af1e800a1061bb93933cf7fe58c48043fb7d52911bc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/01862680879ba669edd67af1e800a1061bb93933cf7fe58c48043fb7d52911bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/01862680879ba669edd67af1e800a1061bb93933cf7fe58c48043fb7d52911bc?s=96&d=mm&r=g","caption":"Richard N Williams"},"description":"Richard N Williams is a technical author and a specialist in the NTP Server and Time Synchronisation industry.","sameAs":["https:\/\/x.com\/galleonsystems"],"url":"https:\/\/www.galsys.co.uk\/news\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/posts\/869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/comments?post=869"}],"version-history":[{"count":1,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/posts\/869\/revisions"}],"predecessor-version":[{"id":1751,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/posts\/869\/revisions\/1751"}],"wp:attachment":[{"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/media?parent=869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/categories?post=869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/tags?post=869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}