- Joined
- Aug 16, 2005
- Messages
- 26,013 (3.79/day)
- Location
- Alabama
System Name | Rocinante |
---|---|
Processor | I9 14900KS |
Motherboard | MSI MPG Z790I Edge WiFi Gaming |
Cooling | be quiet! Pure Loop 240mm |
Memory | 64GB Gskill Trident Z5 DDR5 6000 @6400 |
Video Card(s) | MSI SUPRIM Liquid X 4090 |
Storage | 1x 500GB 980 Pro | 1x 1TB 980 Pro | 1x 8TB Corsair MP400 |
Display(s) | Odyssey OLED G9 (G95SC) |
Case | LANCOOL 205M MESH Snow |
Audio Device(s) | Moondrop S8's on schitt Modi+ & Valhalla 2 |
Power Supply | ASUS ROG Loki SFX-L 1000W |
Mouse | Lamzu Atlantis mini (White) |
Keyboard | Monsgeek M3 Lavender, Akko Crystal Blues |
VR HMD | Quest 3 |
Software | Windows 11 |
Benchmark Scores | I dont have time for that. |
I read something about cloudflare being used to DDoS cloudflare, since it bypassed their own protection from within themselves as 'trusted'
Cloudflare Protection Bypass Vulnerability on Threat Actors' Radar (socradar.io)
That is a thing, but recently (though I'm not @W1zzard there has been an identified http2 0day) that allows tremendous attack amplitude.
HTTP/2 Zero-Day vulnerability results in record-breaking DDoS attacks
The “HTTP/2 Rapid Reset” attack exploits a weakness in the HTTP/2 protocol to generate enormous, hyper-volumetric DDoS attacks. Cloudflare has mitigated a barrage of these attacks in recent months, including an attack three times larger than any previous attack we’ve observed
blog.cloudflare.com