{"id":25,"date":"2006-08-24T14:16:27","date_gmt":"2006-08-24T14:16:27","guid":{"rendered":"http:\/\/ramblingsofasysadmin.com\/blog\/?p=25"},"modified":"2006-08-24T14:16:27","modified_gmt":"2006-08-24T14:16:27","slug":"preventing-against-ddos-attacks","status":"publish","type":"post","link":"https:\/\/ramblingsofasysadmin.com\/?p=25","title":{"rendered":"preventing against ddos attacks."},"content":{"rendered":"<p>what is a ddos attack, you ask?  a distributed denial of service (ddos) attack is when multiple computers try to flood your server with thousands of connections with the goal in mind to bring your server down for a good chunk of time.<br \/>\na lot of people fall victim to these attacks daily.<br \/>\nthey don&#8217;t have to.<br \/>\n(d)dos-deflate is an open-source tool that will prevent against any denial of service attacks.  you can download it <a href=\"http:\/\/deflate.medialayer.com\/\" target=\"_new\">here<\/a>.<br \/>\nall of the configuration files by default get stored in <font face=\"courier\">\/usr\/local\/ddos\/ddos.conf<\/font>.<br \/>\ni&#8217;ve personally tweaked the system to ban the IP for a little longer than the default 600 seconds, and of course, don&#8217;t forget to change the email address so that the warnings go to you.  (you wouldn&#8217;t want your IP being blocked accidentally and have your email warnings go to a possibly unchecked email address!)<br \/>\nyou can also whitelist IP addresses by adding them, line by line, to <font face=\"courier\">\/usr\/local\/ddos\/ignore.ip.list<\/font>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>what is a ddos attack, you ask? a distributed denial of service (ddos) attack is when multiple computers try to flood your server with thousands of connections with the goal in mind to bring your server down for a good chunk of time. a lot of people fall victim to these attacks daily. they don&#8217;t have to. (d)dos-deflate is an open-source tool that will prevent against any denial of service attacks. you can download it <span class=\"ellipsis\">&hellip;<\/span> <span class=\"more-link-wrap\"><a href=\"https:\/\/ramblingsofasysadmin.com\/?p=25\" class=\"more-link\"><span>Read More &rarr;<\/span><\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-25","post","type-post","status-publish","format-standard","hentry","category-system-tools"],"_links":{"self":[{"href":"https:\/\/ramblingsofasysadmin.com\/index.php?rest_route=\/wp\/v2\/posts\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramblingsofasysadmin.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ramblingsofasysadmin.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ramblingsofasysadmin.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramblingsofasysadmin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25"}],"version-history":[{"count":0,"href":"https:\/\/ramblingsofasysadmin.com\/index.php?rest_route=\/wp\/v2\/posts\/25\/revisions"}],"wp:attachment":[{"href":"https:\/\/ramblingsofasysadmin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ramblingsofasysadmin.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=25"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ramblingsofasysadmin.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}