On Mon, Mar 24, 2008 at 6:02 PM, Mike Lyon [EMAIL PROTECTED] wrote:
Howdy all,
So, i'm kind of new to this so please deal with my ignorance. But,
what is common practice these days for HTTP DDoS mitigation during an
attack? You can of course route every offending ip address to null0 at
On Thu, Feb 28, 2008 at 1:54 PM, Ross Vandegrift [EMAIL PROTECTED] wrote:
Hi Everyone,
Just received a light-up of calls about general connectivity, a call
to AboveNet got us the answer that they are having global routing
issues.
Has anyone received any more details?
Seeing issues here
The first product that comes to mind is Resonate. I could be wrong
http://www.resonate.com/prod_glob_disp.html
On 3/18/07, Joe Maimon [EMAIL PROTECTED] wrote:
Hey all,
I am looking for a product I have seen in the past but dont recall its
name or anyother information other than
- it was
On 2/8/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
Going back to this thread, http://www.kx.com/ deals in
financial transaction
databases where they store millions of ticks. They appear to have a
transactional based language with a solution that appears
to be robust and
fail
On 1/20/07, Mark Boolootian [EMAIL PROTECTED] wrote:
Cringley has a theory and it involves Google, video, and oversubscribed
backbones:
http://www.pbs.org/cringely/pulpit/2007/pulpit_20070119_001510.html
The following comment has to be one of the most important comments in
the entire
On 11/22/06, Stefan Hegger [EMAIL PROTECTED] wrote:
Hi,
I wonder if someone knows a tool to use a tcpdump output for anomaly
dedection. It is sometimes really time consuming when looking for identical
patterns in the tcpdump output.
It would be helpful to get a diff between SYN and ACK's
On 7/4/06, Sam Stickland [EMAIL PROTECTED] wrote:
Matt,
A few quick questions for you, if you got the time to answer it would be
appreciated (questions inline):
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Matt Ghali
Sent: 04 July 2006 07:21