Alert
From Computing and Software Wiki
(Difference between revisions)
Line 1: | Line 1: | ||
Alternation(1): | Alternation(1): | ||
+ | |||
- warning at least | - warning at least | ||
- or some action taken against the IP that is attacking you. | - or some action taken against the IP that is attacking you. | ||
+ | |||
+ | |||
+ | |||
Line 9: | Line 13: | ||
Alternation(2) | Alternation(2) | ||
+ | |||
- real time: | - real time: | ||
+ | |||
best effort. | best effort. | ||
+ | |||
Data from the network layer. | Data from the network layer. | ||
+ | |||
Drop all the packets from a specific IP: so netfilter for that maybe dangerous. 'cause the pirate may have faked one of your internal IPs and then you are actually cutting of one of your local network connections. | Drop all the packets from a specific IP: so netfilter for that maybe dangerous. 'cause the pirate may have faked one of your internal IPs and then you are actually cutting of one of your local network connections. | ||
- run time: | - run time: |
Revision as of 17:31, 22 March 2008
Alternation(1):
- warning at least
- or some action taken against the IP that is attacking you.
Alternation(2)
- real time:
best effort.
Data from the network layer.
Drop all the packets from a specific IP: so netfilter for that maybe dangerous. 'cause the pirate may have faked one of your internal IPs and then you are actually cutting of one of your local network connections.
- run time: