search for: mod_evasive

Displaying 12 results from an estimated 12 matches for "mod_evasive".

2017 Jul 09
3
Apache + mod_evasive : problem with test.pl
Hi, I'm currently experimenting with the mod_evasive module for Apache, to protect the server against potential DoS attacks. Here's what I did so far. # yum install mod_evasive Don't touch mod_evasive's default configuration, just restart Apache. # systemctl restart httpd The package includes a test.pl script supposed to launch a...
2019 Nov 11
0
Mod_evasive for HTTPD24 (Software collections)
Hi Team I am planning to use mod_evasive to prevent dos attackS . I am using httpd24-httpd-2.4.34-7.el6.x86_64 (httpd software collections) on Centos 6.5 . Do we have mod_evasive rpm wrt to this httpd version ? Thanks and regards AKshar
2017 Jul 09
0
Apache + mod_evasive : problem with test.pl
Am 09.07.2017 um 13:06 schrieb Nicolas Kovacs: > I tried this on two sandbox machine, one on my LAN, one on a public > server, and both times I got the same result. > > Any suggestions? > > Niki What does apache log? I guess it logs more than just HTTP status 400. Alexander
2016 Aug 29
1
.htaccess file
...protect > against brute force ssh attacks (using iptables rules, which is how I > use it) but IIRC it can also protect against http attacks (I've never > used it that way, so I don't know how difficult this is). I use fail2ban, provides similar functionality like sshguard + Apache mod_evasive (for http DoS attacks). -- Arun Khan
2016 Jun 24
2
[llvm-foundation] apt repositories back!
Le 23/06/2016 à 19:13, Renato Golin a écrit : > On 23 June 2016 at 17:56, Sylvestre Ledru via llvm-foundation > <llvm-foundation at lists.llvm.org> wrote: >> Thanks to the LLVM Foundation and Tanya, the apt repository is now back: >> >> http://apt.llvm.org/ > Nice! Thanks everyone! > > Are we filtering multiple hits, or are we just assuming people will be
2010 Jan 11
2
Securing http authentication from brute force attacks
We have several web applications deployed under Apache that require a user id / password authentication. Some of these use htdigest and others use the application itself. Recently we have experienced several brute force attacks against some of these services which have been dealt with for the nonce by changes to iptables. However, I am not convinced that these changes are the answer. Therefore
2016 Jun 20
3
Pre-built snapshots of trunk
On Mon, Jun 20, 2016 at 10:01 AM, Anton Korobeynikov via llvm-dev < llvm-dev at lists.llvm.org> wrote: > > P.S.: On a similar note, are there any news regarding llvm.org/apt? > We are working on it. Note, however, that it seems that the majority > of bogus load seemed to come from CI systems, which pulled apt repo > for every and each downstream commit without any caching /
2011 Aug 20
4
Apache Changing IPtables C 5.6 via Apache
When a web site is attacked, so far by unsuccessful hackers, my error routine adds the attackers IP address, prefixed by 'deny', to that web site's .htaccess file. It works and the attacker, on second and subsequent attacks, gets a 403 error response. I want to extend the exclusion ability to every web site hosted on a server. My preferred method is iptables. However, when
2006 Aug 07
0
image uploads not working with lighttpd
...od_status", # "mod_evhost", # "mod_compress", # "mod_usertrack", # "mod_rrdtool", # "mod_webdav", # "mod_expire", # "mod_flv_streaming", # "mod_evasive" ) server.max-request-size = 100000 $HTTP["useragent"] =~ "^(.*MSIE.*)|(.*AppleWebKit.*)$" { server.max-keep-alive-requests = 0 } # new way. include as many sockets as you want. I use 5. fastcgi.server = (".fcgi" => ( "V_O_2" => ( &quo...
2016 Aug 28
5
.htaccess file
> -----Original Message----- > From: centos-bounces at centos.org [mailto:centos-bounces at centos.org] On > Behalf Of Keith Keller > Sent: Sunday, August 28, 2016 4:23 PM > To: centos at centos.org > Subject: Re: [CentOS] .htaccess file > > On 2016-08-28, TE Dukes <tdukes at palmettoshopper.com> wrote: > > > > I'm just not following or understanding.
2013 May 19
4
security breach - ftp?
Hi, I'm running Plesk 11.0.9 on a Centos 5.5. A website on that box got hacked last week and malicious code got inserted into some html/php files. So I went to find out what happened... I found no back doors by using rkhunter or manually searching for suspicious files in /tmp, etc. No activity at all in the php logs at the time of the attack. I also analysed of course the system logs
2006 Aug 09
8
Server Hacked: Cpanel
Hi, I have servers of mixed OS, some Centos, some Fedora, and after the flame war that erupted last week (where I said basically nothing and just watched), my server was hacked by this team of hackers, actually their friend: http://www.sibersavascilar.com/ This made Karanbir's statements about mixing Cpanel and Centos (any maybe any linux distro) come true very quickly. If