- Joined
- Aug 16, 2005
- Messages
- 27,163 (3.83/day)
- Location
- Alabama
System Name | RogueOne |
---|---|
Processor | Xeon W9-3495x |
Motherboard | ASUS w790E Sage SE |
Cooling | SilverStone XE360-4677 |
Memory | 128gb Gskill Zeta R5 DDR5 RDIMMs |
Video Card(s) | MSI SUPRIM Liquid X 4090 |
Storage | 1x 2TB WD SN850X | 2x 8TB GAMMIX S70 |
Display(s) | 49" Philips Evnia OLED (49M2C8900) |
Case | Thermaltake Core P3 Pro Snow |
Audio Device(s) | Moondrop S8's on schitt Gunnr |
Power Supply | Seasonic Prime TX-1600 |
Mouse | Razer Viper mini signature edition (mercury white) |
Keyboard | Monsgeek M3 Lavender, Moondrop Luna lights |
VR HMD | Quest 3 |
Software | Windows 11 Pro Workstation |
Benchmark Scores | I dont have time for that. |
I read something about cloudflare being used to DDoS cloudflare, since it bypassed their own protection from within themselves as 'trusted'
Cloudflare Protection Bypass Vulnerability on Threat Actors' Radar (socradar.io)
That is a thing, but recently (though I'm not @W1zzard there has been an identified http2 0day) that allows tremendous attack amplitude.
HTTP/2 Zero-Day vulnerability results in record-breaking DDoS attacks
The “HTTP/2 Rapid Reset” attack exploits a weakness in the HTTP/2 protocol to generate enormous, hyper-volumetric DDoS attacks. Cloudflare has mitigated a barrage of these attacks in recent months, including an attack three times larger than any previous attack we’ve observed
blog.cloudflare.com