SealsWithClubs.eu Back Online After DDoS Scare

by Sadonna Price on March 25, 2013

Like this story? Share it!

    SealsWithClubsJust last week, John Mehaffey posted a story on 4Flush reporting that the SealsWithClubs.eu online poker site was offline due to a suspected DDoS attack. The Bitcoin poker site is US-friendly and was shut down due to this suspected Distributed Denial of Service attack. It is now being reported by Pokerfuse that the site is officially back online and ready to service customers.

    The attack resulted in the site going offline, but reports have stated that no customer has experienced a compromise of their account. The tech people of the site worked hard to get the online poker client back in action so that players could be back online quickly.

    With a Distributed Denial of Service attack, the system will go offline as an overload takes place. Seals founder Bryan Micon stated just yesterday via Twitter:

    “After a solid weekend of #nosleeptillbitcoin grinding, @ SealsWithClubs is back online. Re-download that PC client sealswithclubs.eu/beta-client/.”

    According to our friends at Pokerfuse, when going to the site and downloading the new client, some players may find that a browser notification will pop up stating the security certificate of the site has expired. Micon has stated that this problem will be resolved as quickly as possible.

    SealsWithClubs is a popular US-facing poker site in the Bitcoin-only category and hundreds of players can be found online during the peak hours of game play. It was very important that the site resolve the issues as quickly as possible so players could be back online.

    The new software has now been integrated to the site and additional protection has been placed on the client. Players can go ahead and update their online software option to begin game play.  Seals is also available for Android-powered devices and is one of the hottest bitcoin gambling websites out there right now.

     

    Like this story? Share it!

      Previous post:

      Next post: