You pay big bucks to use akami. And they don't give the service away. I don't think it's that big a threat these days. Good colo with some basic anti-ddos isn't to tough to get if you're a frequent target. I haven't been hit for a half a year at least, and don't expect any anytime soon.
Matt RandallM wrote: > Ok, great stuff so far. Is akami the answer. How can that be done. How > can we use that and how can it be tested. > > > > On Thu, Jan 1, 2009 at 12:11 AM, Matt Jonkman <[email protected] > <mailto:[email protected]>> wrote: > > I had a similar idea a few years ago (I may have been drinking at the > time too). > > Mine was more oriented to when we were taking a ddos every week as > security projects. I proposed all of us poor open source security > projects band together and do an akami type hosting. Everyone hosted > everyone that was part of the setup, and we used dns to spread the load. > > But alas, ddos isn't the problem it used to be. Probably good we didn't > go through the effort to make it happen. > > Matt > > Paul Ferguson wrote: > > It's called Akamai. :-) > > > > - ferg > > > > On Wed, Dec 31, 2008 at 7:58 PM, RandallM <[email protected] > <mailto:[email protected]>> wrote: > > > >> ok, I am drinking, after all it is the NYE celebration. But, I > had this > >> idea pop in. Remember, it is a "first thought idea". That means I > am in > >> need of input to brainstorm with me on it. Here is the initial > thought: > > > >> When fixing infected computers I find that: > >> 1. most people don't have programs installed for preventive much less > >> combative > >> 2. depending on the infection one cannot download programs or go to > >> "helpful" sites to use. > > > >> malware sites often rotate IP or DNS in order to "hide". > > > >> Thought: > >> Why can't we using the same type of process provide access to > programs > >> and or sites in the same manor so that the malware infections cannot > >> "block" because the sites are not permanant? > > > >> Symantec is and always will be "www.symantec.com > <http://www.symantec.com>", as with other sites. > >> they are blocked by malware infections (in various ways that I > would love > >> to > >> understand more). If there were "server" around the globe open with > >> online scanners and tools that rotated with DNS and or IP > addressing the > >> malware could not block it. > > > >> Can this be done with a revolving network of servers from volunteers? > > > >> Make sense or have I already drank too much? > > > >> -- > >> been great, thanks > >> Big R > > > >> _______________________________________________ > >> Fun and Misc security discussion for OT posts. > >> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec > >> Note: funsec is a public and open mailing list. > > > > > > > > > > -- > -------------------------------------------- > Matthew Jonkman > Emerging Threats > Phone 765-429-0398 > Fax 312-264-0205 > http://www.emergingthreats.net > -------------------------------------------- > > PGP: http://www.jonkmans.com/mattjonkman.asc > > > > > > -- > been great, thanks > Big R -- -------------------------------------------- Matthew Jonkman Emerging Threats Phone 765-429-0398 Fax 312-264-0205 http://www.emergingthreats.net -------------------------------------------- PGP: http://www.jonkmans.com/mattjonkman.asc _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
