Use a load-balancer as a first row of defense against DDOS | Exceliance – Aloha Load Balancer

February 28th, 2012
Good article about advanced HAProxy configuration, including timeouts for different phases of HTTP request different variants for rate limiting

[Perl] part of the Gootkit ddos system – Pastebin.com

February 27th, 2012
Example of perl exploit script that runs on a compromised web server and provides remote shell, http proxy and DDoS agent. Works on *nix and windows

[Perl] part of the Gootkit ddos system – Pastebin.com

February 27th, 2012
Example of perl exploit script that runs on a compromised web server and provides remote shell, http proxy and DDoS agent. Works on *nix and windows

Red Hat / CentOS Install mod_security Apache Intrusion Detection And Prevention Engine

February 24th, 2012
# yum install mod_security -- i.e. simple instruction how to install mod_security - an open source Web Application Firewall

Red Hat / CentOS Install mod_security Apache Intrusion Detection And Prevention Engine

February 24th, 2012
# yum install mod_security -- i.e. simple instruction how to install mod_security - an open source Web Application Firewall

Images « VirtualBoxes – Free VirtualBox® Images

February 23rd, 2012
"We provide pre-built images for several open-source operating systems. Please note that: Every image contains the latest software as of the day the image was built. Performing updates is on your own, and may require looking for documentation to read using your favourite search engine. Default usernames and passwords, where required, can be found next to the download link of each image. You are warmly invited to create your own user, or at least to change passwords, if you intend to use the images in a public environment."

Images « VirtualBoxes – Free VirtualBox® Images

February 23rd, 2012
"We provide pre-built images for several open-source operating systems. Please note that: Every image contains the latest software as of the day the image was built. Performing updates is on your own, and may require looking for documentation to read using your favourite search engine. Default usernames and passwords, where required, can be found next to the download link of each image. You are warmly invited to create your own user, or at least to change passwords, if you intend to use the images in a public environment."

Takedowns run amok? The strange Secret Service/GoDaddy assault on JotForm (updated)

February 18th, 2012
This the story about shutdown of JotForms.com -- SAAS service that provide web froms for websites. My website's DNS is also hosted by GoDaddy. I think I should move, but I've not planned any actions

Takedowns run amok? The strange Secret Service/GoDaddy assault on JotForm (updated)

February 18th, 2012
This the story about shutdown of JotForms.com -- SAAS service that provide web froms for websites. My website's DNS is also hosted by GoDaddy. I think I should move, but I've not planned any actions

How to drop nginx cache w/out using 3rd party modules

February 16th, 2012
check this message from nginx mailing list