I was wondering if anyone could PM me for some clarification on this.
I dont want to really mess with my apache if this wont work properly.
Now, my server has been under attack not as bad as before but it still happens atleast once a day.
I dont want to go into the specifics of what they use, because the sad thing is most people will just enter the program name into google.com lmfao..
So my question, will UDP Floods, and SYN attacks be weakened from this?
it seems alot of OT servers are having this problem nowadays.. the only servers i ever see that are North American with over 250+ online are Cytnara,RPGForge of elements, Collapser..
Now, i know 2 of those are on a VPS/Dedicated with a decent internet line, and Collapser, i believe... if i read right from a earlier post of his he hosts with a nice computer from home (on a good internet)
I've talked to my VPS staff about alternatives to fixing UDP Flood/Syn Packets..
They have tried null routing attacking ip's (still dont see how thats possible with source ip spoofed packets)
They suggested switching my IP (lmfao!!) obviosuly if they found the IP once they can do it again,
And now their final suggestion is a heavy duty firewall, I told them that unless they could promise that it would stop my problem i didnt want it.
So any thoughts?
If you use this cms:
http://otland.net/f118/gesior-acc-znote-prefix-edition-chronic-elements-mystic-spirit-47984/
<Gesior-ACC Znote Prefix Edition is special builded to prevent DoS attacks, as well as to make sure regular users who browse it, don't become a victim of the anti dos system>
And use the DoSHttP 2.0 system. You got a DoS/DDoS secure homesite I can ensure you.
However, this only prevents DoS/DDoS attacks from the apache flood, from the homesite. There is possible to DoS/DDoS attack in other ways than that. But this is the most normal way of being attacked.