Sponsored Content
Full Discussion: DDOS attack please help!
Homework and Emergencies Emergency UNIX and Linux Support DDOS attack please help! Post 302926526 by Swathe on Tuesday 25th of November 2014 12:53:16 AM
Old 11-25-2014
Fail2ban could be an option also, I use it on my mail server with good results
 

5 More Discussions You Might Find Interesting

1. Cybersecurity

what is the better way to protect my server from DDos Attack

heloo today i have DDos Attack in my server what is the better way to secure my server from DDos Attack i use CentOS 4&5 i try every firewall and talk to softlayer - iweb i've Tried every possible solutions but I can not find a solution to the problems Give Me The best way plzz (4 Replies)
Discussion started by: a7medo
4 Replies

2. Cybersecurity

Network attack - so what?

In my logs I find entries about attacks on my system. I know IP addresses, I know date and time and I know what they tried to do. So what's the best I can do now? Tell everybody that there are cybercriminals on that network? Write an email to their admin? Anything else? (10 Replies)
Discussion started by: Action
10 Replies

3. Cybersecurity

DDoS Simulation Tools

are there any popular DDoS simulation tools to test my own infrastructure? Anyone tried to setup all these in AWS EC2? (1 Reply)
Discussion started by: boriskong
1 Replies

4. Cybersecurity

DDoS and brute force attack

How to protect DDoS and brute force attack. I want to secure my server and block attacker. (1 Reply)
Discussion started by: romanepo
1 Replies

5. UNIX for Advanced & Expert Users

Anti ddos shell script, is it useful?

Hi guys, just need a opinion from you. I found anti ddos script from github Script What is your opinion about it? Is it usefull? Do you have some similar? I want to protect my servers on all levels, why not in the servers via script. I assume I must fix this script to be useful for me, but... (1 Reply)
Discussion started by: tomislav91
1 Replies
conflict(8)						      System Manager's Manual						       conflict(8)

NAME
conflict - search for alias/password conflicts SYNOPSIS
/usr/lib/mh/conflict [-help] [-mail name] [-search directory] [aliasfiles...] OPTIONS
Prints a list of the valid options to this command. Mails the results to the specified name. Otherwise, the results are sent to the stan- dard output. Searches directories other than /usr/spool/mail, and reports anomalies in those directories. The -search switch can appear more than once in an invocation to conflict, with different directories named. DESCRIPTION
The conflict program checks to see if the interface between MH and transport system is in good shape. It also checks for maildrops in /usr/spool/mail which do not belong to a valid user. It assumes that no user name will start with a dot (.) and thus ignores files in /usr/spool/mail which begin with a dot. The conflict program checks the entries in the specified alias files. It parses the entries in the same way that post would, and outputs any errors which it finds. The program can be used to check the entries in a user's personal alias file, or in the system alias file, /usr/lib/mh/MailAliases. If no alias file is specified, conflict checks the system alias file. The conflict program also checks the /etc/group file for entries which do not belong to a valid user, and for users who do not have a valid group number. In addition, duplicate users and groups are noted. The conflict program should be run under cron, or whenever system accounting takes place. FILES
The system customization file. The system password file. The system group file. Program used to mail results, if the -mail option is used. Directory containing users' maildrops. SEE ALSO
Commands: cron(8) Files: mh-alias(4) conflict(8)
All times are GMT -4. The time now is 02:38 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy