[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Large DDoS, small extortion
- Subject: Large DDoS, small extortion
- From: bzs at world.std.com (Barry Shein)
- Date: Fri, 23 May 2014 13:13:39 -0400
- In-reply-to: <CAJvB4tnXjGv2VU8=K67boFKG0LONaGS6Ewwh_DQ0PwD83WVoqQ@mail.gmail.com>
- References: <CAN-S6ZqtwxcjGudh8Q+bW5u=7WEvz5Jn4Tdk-MmQ1u-9QHXhig@mail.gmail.com> <CABSP1Oe3JS8GVHKTnXwQ4ZA_5=cjyNbCDgRd7Vy0u2G8EUO2+Q@mail.gmail.com> <[email protected]> <[email protected]> <CAJvB4tnXjGv2VU8=K67boFKG0LONaGS6Ewwh_DQ0PwD83WVoqQ@mail.gmail.com>
Sure, of course, many of us have. But how is $VICTIM supposed to
distinguish the wheat from the chaff without reference to specific
cases and results?
Some reasonable-sounding suggestions could be counter-productive or
even downright dangerous (depending on the nature of the attacker.) Or
a waste of time.
On May 22, 2014 at 23:22 ikiris at gmail.com (Blake Dunlap) wrote:
> Most of us wish we didn't. There are so much more productive ways to
> spend the day than fighting a determined and adaptive attacker.
>
> -Blake
>
> On Thu, May 22, 2014 at 10:20 PM, Roland Dobbins <rdobbins at arbor.net> wrote:
> >
> > On May 23, 2014, at 3:38 AM, Barry Shein <bzs at world.std.com> wrote:
> >
> >> Some real life experience and results, case studies.
> >
> > Some of us have quite a bit of real-life experience and results in these situations.
> >
> > ----------------------------------------------------------------------
> > Roland Dobbins <rdobbins at arbor.net> // <http://www.arbornetworks.com>
> >
> > Equo ne credite, Teucri.
> >
> > -- Laoco�¶n
> >
--
-Barry Shein
The World | bzs at TheWorld.com | http://www.TheWorld.com
Purveyors to the Trade | Voice: 800-THE-WRLD | Dial-Up: US, PR, Canada
Software Tool & Die | Public Access Internet | SINCE 1989 *oo*