Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: SolarisRocks
Yes, but, the point is the normal attack is coming from a zombie box that is aimlessly looking for vulnerabilities. Just a random act.

Once you are a target, or identified as a target, the random becomes not random but potentially multiple aggressive probes focusing on a single subnet or set of subnets to find and create a zombie behind the firewall. All of this probing can really resemble a denial of service attack across the entire front of hosted machines.

I am not saying that hosts reject this business out of hand, but that they have to take special time, care and attention and a site might need to be promoted to a dedicated box or segregated to protect the less target worthy machines. This equals higher costs that must be charged. If this cost can't be recovered.. then the host will begin avoiding this sort of head ache.

39 posted on 09/24/2005 8:16:08 PM PDT by dalight
[ Post Reply | Private Reply | To 37 | View Replies ]


To: dalight

Yep, EXACTLY. And the key issue here is who targets what sites and why...


43 posted on 09/24/2005 8:23:12 PM PDT by BIRDS
[ Post Reply | Private Reply | To 39 | View Replies ]

To: dalight

Yep, EXACTLY. And the key issue here is who targets what sites and why...


44 posted on 09/24/2005 8:23:25 PM PDT by BIRDS
[ Post Reply | Private Reply | To 39 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson