RE: [iwar] DDoS/GRC news

From: St. Clair, James (jstclair@vredenburg.com)
Date: 2001-06-05 06:02:41


Return-Path: <sentto-279987-1295-991746200-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Tue, 05 Jun 2001 06:04:07 -0700 (PDT)
Received: (qmail 18689 invoked by uid 510); 5 Jun 2001 12:04:06 -0000
Received: from mv.egroups.com (208.50.144.81) by 204.181.12.215 with SMTP; 5 Jun 2001 12:04:06 -0000
X-eGroups-Return: sentto-279987-1295-991746200-fc=all.net@returns.onelist.com
Received: from [10.1.4.54] by mv.egroups.com with NNFMP; 05 Jun 2001 13:03:20 -0000
X-Sender: JStClair@vredenburg.com
X-Apparently-To: iwar@yahoogroups.com
Received: (EGP: mail-7_1_3); 5 Jun 2001 13:03:19 -0000
Received: (qmail 451 invoked from network); 5 Jun 2001 13:03:19 -0000
Received: from unknown (10.1.10.142) by l8.egroups.com with QMQP; 5 Jun 2001 13:03:19 -0000
Received: from unknown (HELO vre?sd?nt.vredenburg.com) (64.242.205.6) by mta3 with SMTP; 5 Jun 2001 13:03:19 -0000
Received: by VRE_SD_NT with Internet Mail Service (5.5.2650.21) id <L7DN03P8>; Tue, 5 Jun 2001 06:01:43 -0700
Message-ID: <B30A25E2D1D2D1118021006097C3AC63C9804E@CCOPO>
To: "'iwar@yahoogroups.com'" <iwar@yahoogroups.com>
X-Mailer: Internet Mail Service (5.5.2650.21)
From: "St. Clair, James" <jstclair@vredenburg.com>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 5 Jun 2001 06:02:41 -0700 
Reply-To: iwar@yahoogroups.com
Subject: RE: [iwar] DDoS/GRC news
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

So let's see if I have captured some key points, being a non-expert and
having looked a bit at what Fred says about it( ;) ) and what I already
knew:

Simple steps to prevent DDoS:

- Monitor out going packets - something still not done as frequently as our
emphasis on incoming packets. 

- Maximize redundancy of availability - Like Fred does, or the Akamai
service model.

- Test your connection load, including (money is no object) redundant
servers and load balancers, like MS did during the famed "zombie attacks" of
last year.

Do these capture some quick and easy steps?

Jim 

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-06-30 21:44:15 PDT