Prototype security software blocks DDoS attacks

 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Complex Event Processing RSS News Prototype security software blocks DDoS attacks
# 1  
Old 11-05-2009
Prototype security software blocks DDoS attacks

by Tim Greene, Network World Security researchers show lightweight, host-based access-control scheme that dumps attack packets without overwhelming memory, CPU.Researchers have come up with host-based security software that blocks distributed denial-of-service attacks without swamping the memory and CPU of the host machines.The filtering, called identity-based privacy-protected access control (IPCAF), can also prevent [...]

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

5 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Row blocks to column blocks

Hello, Searched for a while and found some "line-to-column" script. My case is similar but with multiple fields each row: S02 Length Per S02 7043 3.864 S02 54477 29.89 S02 104841 57.52 S03 Length Per S03 1150 0.835 S03 1321 0.96 S03 ... (9 Replies)
Discussion started by: yifangt
9 Replies

2. Shell Programming and Scripting

how to split this file into blocks and then send these blocks as input to the tool called Yices?

Hello, I have a file like this: FILE.TXT: (define argc :: int) (assert ( > argc 1)) (assert ( = argc 1)) <check> # (define c :: float) (assert ( > c 0)) (assert ( = c 0)) <check> # now, i want to separate each block('#' is the delimeter), make them separate files, and then send them as... (5 Replies)
Discussion started by: paramad
5 Replies

3. UNIX for Dummies Questions & Answers

Convert 512-blocks to 4k blocks

I'm Unix. I'm looking at "df" on Unix now and below is an example. It's lists the filesystems out in 512-blocks, I need this in 4k blocks. Is there a way to do this in Unix or do I manually convert and how? So for container 1 there is 7,340,032 in size in 512-blocks. What would the 4k block be... (2 Replies)
Discussion started by: rockycj
2 Replies

4. Cybersecurity

Directory of Security Links (Software Tools)

Hello, If you are interested in security, check out this new directory of unix and linux related software tools. Security - Links If you have any of your favorite tools, feel free to add them to the directory. (0 Replies)
Discussion started by: Neo
0 Replies

5. Windows & DOS: Issues & Discussions

Stanford security experts unveil defenses against ‘phishing’ attacks

It's an online con that is growing fast and stealing tens of millions of dollars. An e-mail seemingly from a financial institution instructs you to log on to a legitimate-looking Web site. Such “phishing” attacks exploit a universal weakness in online security: passwords. To read the rest of... (0 Replies)
Discussion started by: ZOverLord
0 Replies
Login or Register to Ask a Question
XAddHost()																XAddHost()

Name
  XAddHost - add a host to the access control list.

Synopsis
  XAddHost(display, host)
	Display *display;
	XHostAddress *host;

Arguments
  display  Specifies a connection to an X server; returned from XOpenDisplay().

  host	   Specifies the network address of the host machine to be added.

Description
  XAddHost()  adds the specified host to the access control list for the server specified by display.  The access control list is a primitive
  security feature that allows access to the server only by other machines listed in a file on the machine running the server.	On UNIX-based
  systems, this file is called /etc/X?.hosts, where ? is the number of the server.

  The application that calls XAddHost() and the server whose list is being updated must be running on the same host machine.

  The  address	data must be a valid address for the type of network in which the server operates, as specified in the family member.  Inter-
  net, DECnet and ChaosNet networks are currently supported.

  For TCP/IP, the address should be in network byte order.  For the DECnet family, the server performs no automatic swapping on  the  address
  bytes.   A  Phase  IV  address is two bytes long.  The first byte contains the least significant eight bits of the node number.  The second
  byte contains the most significant two bits of the node number in the least significant two bits of the byte, and the area in the most sig-
  nificant six bits of the byte.

  For more information on access control, see Volume One, Chapter 15, Other Programming Techniques.

Structures
     typedef struct {
	 int family;	       /* for example FamilyInternet */
	 int length;	       /* length of address, in bytes */
	 char *address;        /* pointer to where to find the bytes */
     } XHostAddress;

     /* The following constants for family member */
     #define FamilyInternet	  0
     #define FamilyDECnet	  1
     #define FamilyChaos	  2

Errors
  BadAccess
  BadValue

See Also
  XAddHosts(), XDisableAccessControl(), XEnableAccessControl(), XListHosts(), XRemoveHost(), XRemoveHosts(), XSetAccessControl().

Xlib - Host Access															XAddHost()