Alert
From Computing and Software Wiki
(Difference between revisions)
(New page: - real time: best time effort - run time: --~~~~) |
|||
Line 1: | Line 1: | ||
- | - real time: best | + | Alternation(1): |
+ | - warning at least | ||
+ | |||
+ | - or some action taken against the IP that is attacking you. | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | |||
+ | Alternation(2) | ||
+ | - real time: | ||
+ | best effort. | ||
+ | Data from the network layer. | ||
+ | Drop all the packets from a specific IP: so netfilter for that maybe dangerous. 'cause the pirate may have faked one of your internal IPs and then you are actually cutting of one of your local network connections. | ||
Revision as of 17:30, 22 March 2008
Alternation(1): - warning at least
- or some action taken against the IP that is attacking you.
Alternation(2) - real time:
best effort. Data from the network layer. Drop all the packets from a specific IP: so netfilter for that maybe dangerous. 'cause the pirate may have faked one of your internal IPs and then you are actually cutting of one of your local network connections.
- run time:
--Khalats 13:23, 22 March 2008 (EDT)