Matt
I am not referring to ddos but to the common folk being hit with the fake
malware and anit viurs programs at tremendous rates lately. Have a way to
"get to" help sites and programs.

On Thu, Jan 1, 2009 at 9:17 AM, Matt Jonkman <[email protected]> wrote:

> You pay big bucks to use akami. And they don't give the service away.
>
> I don't think it's that big a threat these days. Good colo with some
> basic anti-ddos isn't to tough to get if you're a frequent target. I
> haven't been hit for a half a year at least, and don't expect any
> anytime soon.
>
> Matt
>
> RandallM wrote:
> > Ok, great stuff so far. Is akami the answer. How can that be done. How
> > can we use that and how can it be tested.
> >
> >
> >
> > On Thu, Jan 1, 2009 at 12:11 AM, Matt Jonkman <[email protected]
> > <mailto:[email protected]>> wrote:
> >
> >     I had a similar idea a few years ago (I may have been drinking at the
> >     time too).
> >
> >     Mine was more oriented to when we were taking a ddos every week as
> >     security projects. I proposed all of us poor open source security
> >     projects band together and do an akami type hosting. Everyone hosted
> >     everyone that was part of the setup, and we used dns to spread the
> load.
> >
> >     But alas, ddos isn't the problem it used to be. Probably good we
> didn't
> >     go through the effort to make it happen.
> >
> >     Matt
> >
> >     Paul Ferguson wrote:
> >     > It's called Akamai. :-)
> >     >
> >     > - ferg
> >     >
> >     > On Wed, Dec 31, 2008 at 7:58 PM, RandallM <[email protected]
> >     <mailto:[email protected]>> wrote:
> >     >
> >     >> ok, I am drinking, after all it is the NYE celebration. But, I
> >     had this
> >     >> idea pop in. Remember, it is a "first thought idea". That means I
> >     am in
> >     >> need of input to brainstorm with me on it. Here is the initial
> >     thought:
> >     >
> >     >> When fixing infected computers I find that:
> >     >> 1. most people don't have programs installed for preventive much
> less
> >     >> combative
> >     >> 2. depending on the infection one cannot download programs or go
> to
> >     >> "helpful" sites to use.
> >     >
> >     >> malware sites often rotate IP or DNS in order to "hide".
> >     >
> >     >> Thought:
> >     >> Why can't we using the same type of process provide access to
> >     programs
> >     >> and or sites in the same manor so that the malware infections
> cannot
> >     >> "block" because the sites are not permanant?
> >     >
> >     >> Symantec is and always will be "www.symantec.com
> >     <http://www.symantec.com>", as with other sites.
> >     >> they are blocked by malware infections (in various ways that I
> >     would love
> >     >> to
> >     >> understand more). If there were "server" around the globe open
> with
> >     >> online scanners and tools that rotated with DNS and or IP
> >     addressing the
> >     >> malware could not block it.
> >     >
> >     >> Can this be done with a revolving network of servers from
> volunteers?
> >     >
> >     >> Make sense or have I already drank too much?
> >     >
> >     >> --
> >     >> been great, thanks
> >     >> Big R
> >     >
> >     >> _______________________________________________
> >     >> Fun and Misc security discussion for OT posts.
> >     >> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
> >     >> Note: funsec is a public and open mailing list.
> >     >
> >     >
> >     >
> >     >
> >
> >     --
> >     --------------------------------------------
> >     Matthew Jonkman
> >     Emerging Threats
> >     Phone 765-429-0398
> >     Fax 312-264-0205
> >     http://www.emergingthreats.net
> >     --------------------------------------------
> >
> >     PGP: http://www.jonkmans.com/mattjonkman.asc
> >
> >
> >
> >
> >
> > --
> > been great, thanks
> > Big R
>
> --
> --------------------------------------------
> Matthew Jonkman
> Emerging Threats
> Phone 765-429-0398
> Fax 312-264-0205
> http://www.emergingthreats.net
> --------------------------------------------
>
> PGP: http://www.jonkmans.com/mattjonkman.asc
>
>
>


-- 
been great, thanks
Big R
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to