This is something you can use to slow down (even possibly to kill) code
Red, Nimda scan etc.
It's really interesting, good concept.
http://www.hackbusters.net/LaBrea/
At 10:03 AM 9/22/2001 +0200, Alexander Skwar wrote:
>So sprach »Gaylen Fraley« am 2001-09-21 um 18:10:58 -0500 :
> > Are you sur
So sprach »Gaylen Fraley« am 2001-09-21 um 18:10:58 -0500 :
> Are you sure about that? I am trying his script and I just had an "attack"
> and I watched the traffic through my firewall software. It dropped off
> immediately, i.e. showed no activity. I was expecting to see somekind of a
Sure, b
Are you sure about that? I am trying his script and I just had an "attack"
and I watched the traffic through my firewall software. It dropped off
immediately, i.e. showed no activity. I was expecting to see somekind of a
persistant connection, but It doesn't seem to be there. I tested it mysel
At 13:48 2001-09-21 -0700, Bill Rausch wrote:
> sleep( 300 );
>
>I felt that if nothing else I could slow the worm down a little by
>wasting its time before it races off to the next potential target.
>Does what I'm doing make any sense or am I all confused?
I do like the concept behind the sl
On Fri, 21 Sep 2001 13:48:09 -0700, Bill Rausch wrote:
>
>My web sites, which generally have only a couple of real visitors a
>day to run a specific applications, have just been getting hammered
>by this stupid nimda and code red stuff. I'm running
Linux/Apache/PHP
>and have firewalls that filter
My web sites, which generally have only a couple of real visitors a
day to run a specific applications, have just been getting hammered
by this stupid nimda and code red stuff. I'm running Linux/Apache/PHP
and have firewalls that filter everything except port 80 so I'm not
worried about any local
6 matches
Mail list logo