Ronald Bartelshubandspoke.amastelek.com·Dec 19, 2024💣When MTU Problems Turn an ISP Into an Unwitting DDoS Suspect ☣️In the world of networking, even a seemingly minor misconfiguration can spiral into massive disruptions. One such issue is MTU (Maximum Transmission Unit) mismanagement, which can create cascading problems across an Internet Service Provider’s (ISP) ...6 likesddos
Ronald Bartelshubandspoke.amastelek.com·Dec 11, 2024🐱Bad Neighbours in the ISP Landscape | The Unforgivable Oversight of Dirty Traffic 🥵The internet thrives on cooperation, where service providers ensure that their networks play nicely with others. But in South Africa, a growing list of ISPs—with examples being Vodacom, Hero, Afrihost, Cool Ideas, and Vox—are failing at this fundamen...10 likesinternet
Ronald Bartelshubandspoke.amastelek.com·Dec 9, 2024🪖Understanding Cyber-Attacks | How Common Network Flood Attacks Work 💣Cyber-attacks targeting networks are becoming increasingly sophisticated, and businesses must understand how these attacks function to defend their infrastructure effectively. This article focuses on several common cyber-attacks, particularly Distrib...10 likescyber attcks
Ronald Bartelshubandspoke.amastelek.com·Dec 8, 2024🎙️Understanding DDoS Amplification Attacks | The DNS Amplification Threat🎧Distributed Denial of Service (DDoS) amplification attacks are one of the most devastating methods attackers use to overwhelm networks and servers. By exploiting misconfigured services like open DNS resolvers, attackers can multiply their attack traf...10 likesddos
Anik Kumar Nandiblog.anikweb.me·Nov 11, 2024Essential Tips for Securing Your Laravel 11 App from DDoS AttacksWhat Is a DDoS Attack? A DDoS attack happens when lots of computers flood a server with too much traffic, aiming to slow it down or even knock it offline. It's like if hundreds of people tried to rush into a store all at once, causing a big jam that ...1 like·250 readsLaravelWAFs
Dejan Gegićblog.dejangegic.com·Oct 22, 2024File Server with built-in DDoS protection - NetwrokNannyOrigin Try out NetworkNanny for yourself on GitHub, or keep reading the article Long story short There was a guy whose service was being pounded with 10 million requests/hour, and there was nothing he could do about it. As railway charges per GB of t...41 readsGo Language
Anirudh Dayanandanirudhdaya.hashnode.dev·Oct 10, 2024How To Protect your Website from a DDOS attackDistributed Denial of Service (DDoS) attacks can be devastating for websites, causing downtime and loss of revenue. Cloudflare offers robust protection against these attacks. This tutorial will guide you through the process of setting up Cloudflare t...ddos
Chidinma Ozoemenachidinmawrites.hashnode.dev·Oct 4, 2024Securing Your Digital Fortress: Understanding and Protecting Network ComponentsVirtual Network (VNet) A Virtual Network (VNet) is a logically isolated network within a cloud environment, like Azure or AWS. It allows you to securely connect and manage your resources, such as virtual machines (VMs), within the cloud1. VNets can b...firewall
Haseeb Yousufhaseebyousuf.hashnode.dev·Aug 30, 2024Safeguarding Web Applications: The Essential Role of Rate LimitingIn the ever-evolving landscape of web development, protecting applications from abuse and overload is paramount. Rate Limiting emerges as a critical technique in this defense, offering a robust solution to control incoming request rates and maintain ...30 readsddos
Olashubomi Alli-Akinderector.hashnode.dev·Aug 3, 2024Questions related to Azure SecurityWhat is a distributed denial-of-attack? A Distributed Denial of Service (DDoS) attack is a type of cyberattack where an attacker floods an application or network with an overwhelming amount of traffic. The goal is to exhaust the target’s resources, r...defense depth