On Wed, May 29, 2002 at 09:04:53AM -0500, Bernie Berg wrote:
> Hi,
>
> What do you use for a complete backup and recovery solution? I was looking at
>mondo, but thought I would ask you guys.
>
amanda.
www.amanda.org
It's become easy to config in debian, but still requires a certain ze
Hello List :
Recently, some of the fools use SYN ,FIN and ACK packet attack my websit and attempted
DROP my Database -_-
Now, I using iptables to protect my website..
<<<
iptables -A FORWARD -p tcp --syn -m limit --limit 1/m -j ACCEPT
iptables -A FORWARD -p tcp --tcp-flags SYN,ACK,FIN,RS
I'm not sure if you're refering to SYN flooding, but if you are you can compile syn
cookies into your kernel, then enable it by doing a "echo 1 >
/proc/sys/net/ipv4/tcp_syncookies".
As for striking back, it's not recommended (it's illegal, they might be attacking from
an innocent host they hac
On Wed, May 29, 2002 at 09:04:53AM -0500, Bernie Berg wrote:
> Hi,
>
> What do you use for a complete backup and recovery solution? I was
> looking at mondo, but thought I would ask you guys.
>
amanda.
www.amanda.org
It's become easy to config in debian, but still requires a certain ze
Hello List :
Recently, some of the fools use SYN ,FIN and ACK packet attack my websit and
attempted DROP my Database -_-
Now, I using iptables to protect my website..
<<<
iptables -A FORWARD -p tcp --syn -m limit --limit 1/m -j ACCEPT
iptables -A FORWARD -p tcp --tcp-flags SYN,ACK,FIN,RST
I'm not sure if you're refering to SYN flooding, but if you are you can compile
syn cookies into your kernel, then enable it by doing a "echo 1 >
/proc/sys/net/ipv4/tcp_syncookies".
As for striking back, it's not recommended (it's illegal, they might be
attacking from an innocent host they hack
6 matches
Mail list logo