Displaying 11 results from an estimated 11 matches for "mansour".
Did you mean:
mansouri
2009 Aug 29
10
Combatting DDoS attack
Hi,
I''ve been working the past 8 hrs combatting DDoS attacks on websites and dedicated servers I host for clients.
They''re hitting one specific IP address, but coming from thousands of external IP addresses.
I use:
shorewall-4.0.10-3.noarch
How can I tackle this? I''ve blocked many subnets in the blacklist file but it''s made very little difference.
If
2003 Apr 26
4
lists.shorewall.net is back up
That could have gone smoother. I had many problems with the NFS install on
my firewall then once I got the server back up, mail delivery was broken :-
(
I still haven''t gotten ulogd to run under RH9.0 but everything else seems
to be working ok...
-Tom
--
Tom Eastep \ Shorewall - iptables made easy
Shoreline, \ http://www.shorewall.net
Washington USA \ teastep@shorewall.net
2003 Aug 27
8
DDoS attacks, what can be done?
Hi,
I run two live c-class subnets on the internet. Last
Sunday morning I was hit with a DDoS attack and it
hasn''t stopped.
I made modifications on my shorewall firewall during
Sunday to lesson the impact, as they were hammering me
with 180k/5sec traffic both ways (inbound and
outbound).
One of the primary things which helped reduce their
DDoS was enabling "norfc1918" on the
2011 Jan 26
1
Randomness in packet padding length as a feature
Hello list,
RFC 4253 provides for per-packet random padding, the length of which
depends on the payload and the cipher block size. If I understand
correctly, for OpenSSH (5.7) this is done in packet.c lines 674-684
and 881-911?
Although the padding itself is random, its length is not, and the
final packet size is just a step function of the size of the payload.
This can be a problem to some
2010 Feb 02
0
No subject
...uting problem. I guess I will have to add on tinc-up
script on both sides but in combination with the vpn device I need
some guidance.
Can you see how the configuration can be enhanced to reach the whole
network of machines on the home network from laptops directly ?
Any suggestions are welcome.
Mansour Farghaly
2012 Jun 12
0
International Workshop on Management of Big Data Systems (MBDS 2012) - Deadline is near
...OMMITTEE
Amitanand Aiyer, Facebook
Adhyas Avasthi, Nokia Research
Milind Bhandarkar, Greenplum Labs, EMC
Randal Burns, John Hopkins University
Garth Gibson, Carnegie Mellon University and Panasas Inc.
Herodotos Herodotou, Duke University
Michael A Kozuch, Intel
Kai Li, Princeton University
Mohamed Mansour, Amazon
Aravind Menon, Facebook
Arif Merchant, Google
Beth Plale, Indiana University
Indrajit Roy, HP Labs
Gabor Szabo, Twitter
Craig Ulmer, Sandia National Lab
Kushagra Vaid, Microsoft
Weikuan Yu, Auburn University
Philip Zeyliger, Cloudera
2012 Jun 12
0
International Workshop on Management of Big Data Systems (MBDS 2012) - Deadline is near
...OMMITTEE
Amitanand Aiyer, Facebook
Adhyas Avasthi, Nokia Research
Milind Bhandarkar, Greenplum Labs, EMC
Randal Burns, John Hopkins University
Garth Gibson, Carnegie Mellon University and Panasas Inc.
Herodotos Herodotou, Duke University
Michael A Kozuch, Intel
Kai Li, Princeton University
Mohamed Mansour, Amazon
Aravind Menon, Facebook
Arif Merchant, Google
Beth Plale, Indiana University
Indrajit Roy, HP Labs
Gabor Szabo, Twitter
Craig Ulmer, Sandia National Lab
Kushagra Vaid, Microsoft
Weikuan Yu, Auburn University
Philip Zeyliger, Cloudera
2010 Aug 05
1
Correct way to use quagga and shorewall
Hi,
I''ve setup quagga on a shorewall firewall server.
The only purpose for this is to use BGP to connect to a "peering platform" supplied by our data centre supplier.
There are some very large ISP''s (and other various providers including google) on this peering platform and connecting to it will speed up access to/from our services and hosted servers.
The physical
2010 Feb 07
1
Only reaching one machine at network
Hi there,
I am using tinc since some monthes. I think the basic idea of
extending vpn to a mesh of systems via tun/tap is great. And I think
it is one of the useable developments compared to the much more
complex vpn solutions I had used in the past. Great work.
Setting up tinc I have fought with the configuration (and with the
concepts) for a while as I have found no example that covers my
2011 Jan 26
1
Packets Sizes and Information Leakage
This message is a few years old so I cannot reply to the original, but
it is still of current research interest.
> So one of my coworkers is doing a little research on SSH usage in the
> wild using netflow data. One of the things he's trying to do is
> determine a way to differentiate between data transfers and interactive
> sessions. We thought of a couple of ways but we wanted
2012 Apr 25
1
Average for Huge file
Hi, I am a PhD student. Basic knowing R. I have 2 datw files 1st 5min
intervals & the 2nd 1min for a month. My taske is to have 15min average for
all.
This how data look;
Date Pm FF LL KK
HH NN Ww DD
01/01/2012 00:00:00 349 120 10 8 1178
1292 2005 762
01/01/01/2012