the current google entry seems to go to 213.251.145.96.<br>as for DDoS a friend of mine wrote a script designed to send 2 dos packets back for every one received. the consequences; PING-WAR<br clear="all">Jacob Mansfield<br>
Programmer<br><br>
<br><br><div class="gmail_quote">On 8 December 2010 20:24, Progga <span dir="ltr"><<a href="mailto:proggaprogga@gmail.com">proggaprogga@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<div class="im">On Wed, Dec 08, 2010 at 09:08:26AM +0000, Jason Clifford wrote:<br>
> On Tue, 2010-12-07 at 22:46 +0000, t.clarke wrote:<br>
> > Hmm, think it actually not a propagation issue after all......<br>
> > Having tried the bytemark nameservers directly using nslookup, none of<br>
> > them would respond to any query - so looks like they are 'dead'<br>
><br>
> Do be aware that if you host a wikileaks mirror your server will be<br>
> attacked with the DDoS that is attacking wikileaks.<br>
<br>
</div>Look at the up side. If you host a mirror, then you get an<br>
opportunity to practise fending off DDoS attacks :-)<br>
<br>
I once read an article [0] linked from reddit which detailed someone's<br>
experience and it sounded really interesting.<br>
<br>
[0] <a href="http://blog.unixy.net/2010/08/the-penultimate-guide-to-stopping-a-ddos-attack-a-new-approach/" target="_blank">http://blog.unixy.net/2010/08/the-penultimate-guide-to-stopping-a-ddos-attack-a-new-approach/</a><br>
<div><div></div><div class="h5"><br>
--<br>
Gllug mailing list - <a href="mailto:Gllug@gllug.org.uk">Gllug@gllug.org.uk</a><br>
<a href="http://lists.gllug.org.uk/mailman/listinfo/gllug" target="_blank">http://lists.gllug.org.uk/mailman/listinfo/gllug</a><br>
</div></div></blockquote></div><br>