Another approach, without doing too many changes:
In middleware.py, right before it initializes the main session from config:
session2_opts = {
'session.type': 'cookie',
'session.key': 'sess2',
'session.cookie_expires': True,
'session.auto': True,
On Apr 4, 4:28 pm, cd34 mcd...@gmail.com wrote:
While the controller is cleaner, does that really make it more
readable? From a maintainability standpoint, would someone new to the
code be able to see what that action was doing reasonably quickly?
If i were going for code readability, I
On Mon, Apr 05, 2010 at 04:02:18PM -0700, cd34 wrote:
What I've always debated is whether the form schemas should be a model
or in the controller.
The controller, I'd say.
Marius Gedminas
--
Cool. Does it also recode ISO10646-1 pcf files into the funny
permutations and subsets used a long
On Apr 6, 10:54 am, Jonathan Vanasco jonat...@findmeon.com wrote:
Usually I go for application maintainability. Looking at the original
code , this bigtask() class looked to be a logging functionality that
is used across multiple controllers and actions. i'm inclined to
refactor code like
Hey Guys,
Somebody I'm told is sending DOS attacks to my site? I need some
guidance on what to install. Driving me a little crazy.
Ideas welcome...
Thanks,
Garyc
--
You received this message because you are subscribed to the Google Groups
pylons-discuss group.
To post to this group, send
You would handle this at the firewall level, are you in charge of the
firewall?
The ideal here is to block the offending ip address or blocks of ip
addresses.
On Tue, Apr 6, 2010 at 6:46 PM, gazza burslem2...@yahoo.com wrote:
Hey Guys,
Somebody I'm told is sending DOS attacks to my site? I
I was told to use mod evasive with apache? I dont have any firewall
I'm running on a VPS on
linux with a pylons web server.
Anybody got experience with mod evasive?
Much appreciated all help,
Thanks,
Garyc
On Apr 6, 6:14 pm, Garland, Ken R garlan...@gmail.com wrote:
You would handle this at
Do you have root access to your VPS? If there is a pretty consistent set of
IP addresses making these attacks, then you might be able to use a software
firewall built into linux called iptables. If not, or if it's hard to
differentiate between attackers and legitimate requests by IP address then
Much apreciated feedback. I will look into iptables and see if I can
rehect selected IP addresses.
All good and a great learning experience.
On Apr 6, 6:54 pm, Alec Lyons alecly...@gmail.com wrote:
Do you have root access to your VPS? If there is a pretty consistent set of
IP addresses making
Have you looked at the logs to determine whether you are under a D/DOS
attack?
for mod_evasive: http://www.apachelounge.com/viewtopic.php?t=917
contains a pretty decent guide.
However, you'll need to set up some decent firewall rules if you are
under attack once you determine the type of attack.
I REALLY like to keep things separated and I like my functions to be small,
within reason. However I am making the assumption that myself and anyone
else who comes back to change the code will be using tools that let them
index or tag the source, enabeling them to hit some shortcut on a function
11 matches
Mail list logo