search for: mansour

Displaying 11 results from an estimated 11 matches for "mansour".

Did you mean: mansouri
2009 Aug 29
10
Combatting DDoS attack
Hi, I''ve been working the past 8 hrs combatting DDoS attacks on websites and dedicated servers I host for clients. They''re hitting one specific IP address, but coming from thousands of external IP addresses. I use: shorewall-4.0.10-3.noarch How can I tackle this? I''ve blocked many subnets in the blacklist file but it''s made very little difference. If
2003 Apr 26
4
lists.shorewall.net is back up
That could have gone smoother. I had many problems with the NFS install on my firewall then once I got the server back up, mail delivery was broken :- ( I still haven''t gotten ulogd to run under RH9.0 but everything else seems to be working ok... -Tom -- Tom Eastep \ Shorewall - iptables made easy Shoreline, \ http://www.shorewall.net Washington USA \ teastep@shorewall.net
2003 Aug 27
8
DDoS attacks, what can be done?
Hi, I run two live c-class subnets on the internet. Last Sunday morning I was hit with a DDoS attack and it hasn''t stopped. I made modifications on my shorewall firewall during Sunday to lesson the impact, as they were hammering me with 180k/5sec traffic both ways (inbound and outbound). One of the primary things which helped reduce their DDoS was enabling "norfc1918" on the
2011 Jan 26
1
Randomness in packet padding length as a feature
Hello list, RFC 4253 provides for per-packet random padding, the length of which depends on the payload and the cipher block size. If I understand correctly, for OpenSSH (5.7) this is done in packet.c lines 674-684 and 881-911? Although the padding itself is random, its length is not, and the final packet size is just a step function of the size of the payload. This can be a problem to some
2010 Feb 02
0
No subject
...uting problem. I guess I will have to add on tinc-up script on both sides but in combination with the vpn device I need some guidance. Can you see how the configuration can be enhanced to reach the whole network of machines on the home network from laptops directly ? Any suggestions are welcome. Mansour Farghaly
2012 Jun 12
0
International Workshop on Management of Big Data Systems (MBDS 2012) - Deadline is near
...OMMITTEE Amitanand Aiyer, Facebook Adhyas Avasthi, Nokia Research Milind Bhandarkar, Greenplum Labs, EMC Randal Burns, John Hopkins University Garth Gibson, Carnegie Mellon University and Panasas Inc. Herodotos Herodotou, Duke University Michael A Kozuch, Intel Kai Li, Princeton University Mohamed Mansour, Amazon Aravind Menon, Facebook Arif Merchant, Google Beth Plale, Indiana University Indrajit Roy, HP Labs Gabor Szabo, Twitter Craig Ulmer, Sandia National Lab Kushagra Vaid, Microsoft Weikuan Yu, Auburn University Philip Zeyliger, Cloudera
2012 Jun 12
0
International Workshop on Management of Big Data Systems (MBDS 2012) - Deadline is near
...OMMITTEE Amitanand Aiyer, Facebook Adhyas Avasthi, Nokia Research Milind Bhandarkar, Greenplum Labs, EMC Randal Burns, John Hopkins University Garth Gibson, Carnegie Mellon University and Panasas Inc. Herodotos Herodotou, Duke University Michael A Kozuch, Intel Kai Li, Princeton University Mohamed Mansour, Amazon Aravind Menon, Facebook Arif Merchant, Google Beth Plale, Indiana University Indrajit Roy, HP Labs Gabor Szabo, Twitter Craig Ulmer, Sandia National Lab Kushagra Vaid, Microsoft Weikuan Yu, Auburn University Philip Zeyliger, Cloudera
2010 Aug 05
1
Correct way to use quagga and shorewall
Hi, I''ve setup quagga on a shorewall firewall server. The only purpose for this is to use BGP to connect to a "peering platform" supplied by our data centre supplier. There are some very large ISP''s (and other various providers including google) on this peering platform and connecting to it will speed up access to/from our services and hosted servers. The physical
2010 Feb 07
1
Only reaching one machine at network
Hi there, I am using tinc since some monthes. I think the basic idea of extending vpn to a mesh of systems via tun/tap is great. And I think it is one of the useable developments compared to the much more complex vpn solutions I had used in the past. Great work. Setting up tinc I have fought with the configuration (and with the concepts) for a while as I have found no example that covers my
2011 Jan 26
1
Packets Sizes and Information Leakage
This message is a few years old so I cannot reply to the original, but it is still of current research interest. > So one of my coworkers is doing a little research on SSH usage in the > wild using netflow data. One of the things he's trying to do is > determine a way to differentiate between data transfers and interactive > sessions. We thought of a couple of ways but we wanted
2012 Apr 25
1
Average for Huge file
Hi, I am a PhD student. Basic knowing R. I have 2 datw files 1st 5min intervals & the 2nd 1min for a month. My taske is to have 15min average for all. This how data look; Date Pm FF LL KK HH NN Ww DD 01/01/2012 00:00:00 349 120 10 8 1178 1292 2005 762 01/01/01/2012