- Joined
- Jan 3, 2021
- Messages
- 4,185 (2.53/day)
- Location
- Slovenia
Processor | i5-6600K |
---|---|
Motherboard | Asus Z170A |
Cooling | some cheap Cooler Master Hyper 103 or similar |
Memory | 16GB DDR4-2400 |
Video Card(s) | IGP |
Storage | Samsung 850 EVO 250GB |
Display(s) | 2x Oldell 24" 1920x1200 |
Case | Bitfenix Nova white windowless non-mesh |
Audio Device(s) | E-mu 1212m PCI |
Power Supply | Seasonic G-360 |
Mouse | Logitech Marble trackball, never had a mouse |
Keyboard | Key Tronic KT2000, no Win key because 1994 |
Software | Oldwin |
In a ddos situation, the communication between server and browser is unreliable at best. What I meant was a signal from your servers/load balancer to the ISP, which can then react by switching to more restrictive filtering for your IPs. It would be a small part of the solution when a perfect solution doesn't exist anyway.In theory, to the browser, and that will show an error message. But during a HTTP flood the attacker simply sends requests as fast as it can, without looking at the result or errors. Basically like when you're holding down F5 in your browser (please don't try, you might get your IP banned)