Since I originally posted this. I ported my servers to a new VPS.
There was no real way to avoid the attacks
on the VPS. Ideally I need to port my servers to a dedicated machine
with an IDS infront to filter the blighters out.
Soft-based solutions woul still take a hit on performance.

On Apr 26, 3:35 pm, cd34 <[email protected]> wrote:
> On Apr 26, 4:19 pm, Haron Media <[email protected]> wrote:
>
> > Anyways, so I was wondering how soon before the botnets start deploying
> > slowloris. Seems like they already have.
>
> So far, every machine we've checked that was hitting the machine with
> slowloris is running linux.  Since Windows can't handle more than 130
> sockets, its usefulness in slowloris is questionable.  It does appear
> that one of the botnet payloads that runs on compromised linux
> machines does have the python code.  Now if I could just find an IP or
> two in the USA that was involved.  :)
>
> --
> You received this message because you are subscribed to the Google Groups 
> "pylons-discuss" group.
> To post to this group, send email to [email protected].
> To unsubscribe from this group, send email to 
> [email protected].
> For more options, visit this group 
> athttp://groups.google.com/group/pylons-discuss?hl=en.

-- 
You received this message because you are subscribed to the Google Groups 
"pylons-discuss" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/pylons-discuss?hl=en.

Reply via email to