Sponsored Content
Special Forums Cybersecurity what is the better way to protect my server from DDos Attack Post 302209151 by a7medo on Thursday 26th of June 2008 03:36:01 AM
Old 06-26-2008
what is the better way to protect my server from DDos Attack

heloo
today i have DDos Attack in my server
what is the better way to secure my server from DDos Attack
i use CentOS 4&5
i try every firewall and talk to softlayer - iweb i've Tried every possible solutions but I can not find a solution to the problems
Give Me The best way plzz
 

7 More Discussions You Might Find Interesting

1. Cybersecurity

DDoS Simulation Tools

are there any popular DDoS simulation tools to test my own infrastructure? Anyone tried to setup all these in AWS EC2? (1 Reply)
Discussion started by: boriskong
1 Replies

2. Linux

Binary files damaged after attack on the server

Hello, a few days ago (June 19) a server that I manage has suffered an attack. Analyzing the log I discovered that there were several attempts to access a web scanner called w00tw00t.at.ISC.SANS.DFind I set the firewall to prevent further visits from this scanner. The problem is that the... (3 Replies)
Discussion started by: viessenetwork
3 Replies

3. Ubuntu

Problem in Postfix server/is my server got some attack

Hi Friends, This is logs of my mail log: mail for yahoo.com.tw is using up 4001 of 6992 active queue entries : 1 Time(s) mail for yahoo.com.tw is using up 4001 of 7018 active queue entries : 1 Time(s) mail for yahoo.com.tw is using up 4001 of 7072 active queue entries : 1 Time(s) ... (1 Reply)
Discussion started by: darakas
1 Replies

4. Cybersecurity

DDoS and brute force attack

How to protect DDoS and brute force attack. I want to secure my server and block attacker. (1 Reply)
Discussion started by: romanepo
1 Replies

5. Emergency UNIX and Linux Support

DDOS attack please help!

Dear community, my site was recently attacjed by DDOS technique and goes down in a few minutes. My site runs under Debian/Apache2/Mysql. I identified the IPs who attack me and block it through iptable firewall from debian. Something like: iptables -D INPUT -s xxx.xxx.xxx.xxx -j DROP This... (7 Replies)
Discussion started by: Lord Spectre
7 Replies

6. UNIX for Advanced & Expert Users

Anti ddos shell script, is it useful?

Hi guys, just need a opinion from you. I found anti ddos script from github Script What is your opinion about it? Is it usefull? Do you have some similar? I want to protect my servers on all levels, why not in the servers via script. I assume I must fix this script to be useful for me, but... (1 Reply)
Discussion started by: tomislav91
1 Replies

7. What is on Your Mind?

Revive Ad Server MySQL Injection Attack

No rest for the weary, a Revive Ad Server I am responsible for experienced a MySQL injection attack due to a vulnerability uncovered in the past few months. I was busy developing Vue.js code for the forums and thought to myself "I will get around to upgrading to Revive 4.2.0 (supposedly the... (0 Replies)
Discussion started by: Neo
0 Replies
dtc_install_centos(8)					      System Manager's Manual					     dtc_install_centos(8)

NAME
dtc_install_centos - bootstrap a CentOS install to use in a chroot or VM SYNOPSIS
dtc_install_centos <install root> <yum environment> DESCRIPTION
This shell script is part of the dtc-xen package, generally to be used by the dtc panel to install a new a Xen VPS server. This script is called by dtc_reinstall_os when the user chooses to install the CentOS operating system. How it works: it generates a temporary yum configuration in the yum environment directory, that directs yum to act inside the install root instead of in the base system; then it kindly requests yum to install the basesystem, centos-release and yum packages onto it. Yum then uses the configuration to download the required (usually, security-updated) packages and then perform the RPM installation process under the install root. It requires both RPM and yum. It does work under Debian (it was developed in Ubuntu first). It should also work on RPM-based systems without destroying the system-wide RPM and yum configurations. OPTION
<install root> Target directory where CentOS will be deployed. Must exist beforehand. <yum environment> Directory where yum will store the repository manifests and configuration. Will be automatically created. Cached RPMs and manifests will be left, as usual, in a directory var/cache/yum inside the install root. EXAMPLE
dtc_install_centos /root/yum /xen/13 This will setup the operating system in /xen/13, with the CentOS configuration folder in /root/yum. BUGS
It's limited to CentOS 5 at the moment. It must be run as root. Under some circumstances, the installation process itself may kill processes running on the host machine. The chroot yum does should be sufficient to avoid this, but we haven't been able, yet, to ascertain why this fails sometimes. SEE ALSO
dtc_reinstall_os(8) VERSION
This documentation describes dtc_install_os version 0.3.1. See http://www.gplhost.com/software-dtc-xen.html for updates. dtc_install_centos(8)
All times are GMT -4. The time now is 05:47 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy