Or we can hide the real ip using something like CloudFlare. Such as an example http://www.zonegeek.tk/ .Wallahualam. Sent from my BlackBerry® smartphone
-----Original Message----- From: Harisfazillah Jamel <[email protected]> Sender: [email protected] Date: Wed, 22 Jun 2011 12:07:23 To: Open Web Application Security Project (OWASP) Malaysia Local Chapter<[email protected]> Reply-To: "Open Web Application Security Project \(OWASP\) Malaysia Local Chapter" <[email protected]> Subject: Re: [OWASP-Malaysia] DDoS Defence Guide Released France CERT Team, Immediate action that we can do is to lower the TTL of the DNS. Under Preparation step Confirm DNS time-to-live (TTL) settings for the systems that might be attacked. Lower the TTLs, if necessary, to facilitate DNS redirection if the original IP addresses get attacked. 600 is a good TTL value. Why? Cache for DNS (ISP level, users DNS cache level) can be expired much more faster so any redirection that we do by using Domain name can be done immediately. On Wed, Jun 22, 2011 at 11:07 AM, Harisfazillah Jamel <[email protected]> wrote: > Republish for Operation Defence Malaysia. > > DDoS Defence Guide Released France CERT > > http://bit.ly/mcsrki > > The original page with others publication by French Cert. > > http://cert.societegenerale.com/fr/publications.html > _______________________________________________ OWASP-Malaysia mailing list [email protected] https://lists.owasp.org/mailman/listinfo/owasp-malaysia OWASP Malaysia Wiki http://www.owasp.my OWASP Malaysia Facebook http://www.facebook.com/OWASP.Malaysia OWASP Malaysia Twitter #owaspmy http://www.twitter.com/owaspmy _______________________________________________ OWASP-Malaysia mailing list [email protected] https://lists.owasp.org/mailman/listinfo/owasp-malaysia OWASP Malaysia Wiki http://www.owasp.my OWASP Malaysia Facebook http://www.facebook.com/OWASP.Malaysia OWASP Malaysia Twitter #owaspmy http://www.twitter.com/owaspmy

