Hello!
I've tried to block users from surfing the web, once they have moved a certain amount
of traffic per week.
I put a series of "count" rules in ipfw and let cron call a script every 5 minutes to
read the associeted byte counter
and possibly insert "deny" rules *after* the count rules.
The pr
Andrea Venturoli wrote:
ipfw's manual page states that after a count the packet goes ahead in the rule chain as if nothing has happened, but at
this points I'm beginning to wonder wether this is true or wether the count rules also allow traffic through as if they
were "pass".
No, count works as
Hi there
I want to know if i change the dst ip addr. of a packet the socket sent sys
call won't change it, will it ?
in other words will the divert socket type change the ip address itself ?
THANX
_
The new MSN 8: smart spam protect
soheil soheil wrote:
Hi there
I want to know if i change the dst ip addr. of a packet the socket sent
sys call won't change it, will it ?
in other words will the divert socket type change the ip address itself ?
Huh? The process at the other end of the divert socket may rewrite
any part of it.