-
July 1st, 2007, 04:29 AM
#11
I would look into aim pro it works with outlook :-)
-
July 1st, 2007, 04:56 PM
#12
-
July 2nd, 2007, 04:04 AM
#13
iptabels -L -n DROP all -- 216.178.38.116 0.0.0.0/0
or
ip route add 216.178.38.116 via 127.0.0.1
-
July 3rd, 2007, 12:16 AM
#14
The3ntropy , I am unsure of what you mean; is it that you are drunker then I ?
Oh wait, I'm sober! ( remind me to fix that. )
Providing these commands can be used on the router in use ( I think from a prior thread it may be a Netgear wireless? ) Oh well, let's cover these anyway.
iptabels -L -n DROP all -- 216.178.38.116 0.0.0.0/0
( note: spelling counts using command line -- it is iptables, not iptabels )
I read this as:
list iptables entries ( iptabels -L ), in numeric format (-n), disjointed target from unknown chain ( DROP ), all protocols ( all ), disjointed hyphens ( -- ), net-address ( 216.178.38.116 ), then disjointed address ( 0.0.0.0 ) that has a netmask of 0.0.0.0 ( /0 )
That makes no sense. I think what you meant was something like
iptables -I FORWARD -d 216.178.32.0/20 -j DROP
or
iptables -I FORWARD -d 216.178.32.0/20 -j REJECT
These would add the rule to the FORWARD chain.
Notice the Netrange used, this discussed more below.
Notice too I did not use the -A, but the -I.
The reason for this is we do not know what rules are already in place, and appending the rule to the end of the chain ( using -A ) may be moot if there is already a rule before it that allows the forwarding of the packets. Inserting the rule ( using the -I ) without a rule number specified places the rule at the head of the chain. This should work, providing the default FORWARD policy is DROP!
Of course, a reboot would nullify the addition to iptables unless you had saved it in some manner, but that is another topic.
ip route add 216.178.38.116 via 127.0.0.1
This might be a useful tactic during a specific DOS attack, but you are limited to a specific address here, that of profile.myspace.com. It does not stop anything else from Myspace from being accessed.
If you want to use routing tables, why not something like
ip route add prohibit 216.178.32.0/20
or better yet
ip route add unreachable 216.178.32.0/20
These would block a bit more of the Myspace netrange?
" And maddest of all, to see life as it is and not as it should be" --Miguel Cervantes
-
July 3rd, 2007, 02:08 AM
#15
you say tables, I say tabels
alias iptabels='iptables'
last night I felt helpful so was reading some stuff on here, first line was a sad attempt to drop all packets from the root myspace ip
second was just null-routing all packets to the ground; if you 'prohibit' or 'unreachable' packets it takes more cpu time to make the decision of what to do with the packet (from my experiences at least with heavy DRDoS attacks)
-
July 3rd, 2007, 02:25 AM
#16
Actually, I am on vacation, so I say
pour me another drink!
" And maddest of all, to see life as it is and not as it should be" --Miguel Cervantes
-
July 3rd, 2007, 02:46 PM
#17
I have to go over there and setup the wireless 'security' on the netgear router and also, clean out both PC's and notebook. Since they all run very slow and seems to be infected with spyware/malware etc...
also, have to install a label maker on workstation 1. Have to be there at 12:30 it's 9:45 here.
I will post later results.
Similar Threads
-
By gore in forum Operating Systems
Replies: 2
Last Post: February 25th, 2005, 08:12 AM
-
By KuiXing-2005 in forum Cosmos
Replies: 8
Last Post: February 8th, 2005, 05:10 PM
-
By gore in forum Other Tutorials Forum
Replies: 6
Last Post: October 5th, 2004, 08:26 AM
-
By lepricaun in forum Programming Security
Replies: 9
Last Post: August 19th, 2004, 05:21 PM
-
By sun7dots in forum AntiOnline's General Chit Chat
Replies: 6
Last Post: April 30th, 2002, 02:04 PM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|