Alert
From Computing and Software Wiki
(Difference between revisions)
(New page: - real time: best time effort - run time: --~~~~) |
|||
| Line 1: | Line 1: | ||
| - | - real time: best | + | Alternation(1): |
| + | - warning at least | ||
| + | |||
| + | - or some action taken against the IP that is attacking you. | ||
| + | |||
| + | |||
| + | |||
| + | |||
| + | |||
| + | Alternation(2) | ||
| + | - real time: | ||
| + | best effort. | ||
| + | Data from the network layer. | ||
| + | Drop all the packets from a specific IP: so netfilter for that maybe dangerous. 'cause the pirate may have faked one of your internal IPs and then you are actually cutting of one of your local network connections. | ||
Revision as of 17:30, 22 March 2008
Alternation(1): - warning at least
- or some action taken against the IP that is attacking you.
Alternation(2) - real time:
best effort. Data from the network layer. Drop all the packets from a specific IP: so netfilter for that maybe dangerous. 'cause the pirate may have faked one of your internal IPs and then you are actually cutting of one of your local network connections.
- run time:
--Khalats 13:23, 22 March 2008 (EDT)
