<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4591647185267599189</id><updated>2025-09-05T18:09:20.590-07:00</updated><category term="News"/><category term="DDoS Attacks"/><category term="DDoS Mitigation"/><category term="DDoS Protection"/><category term="Vulnerabilities"/><category term="Online Games"/><category term="UDP Attack Scripts"/><category term="UDP DDoS Attacks"/><category term="UDP Games"/><category term="WordPress"/><category term="featured"/><title type='text'>Hyperfilter DDoS Protection Solutions Blog</title><subtitle type='html'>Hyperfilter DDoS Protection Solutions Blog</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://blog.hyperfilter.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default'/><link rel='alternate' type='text/html' href='http://blog.hyperfilter.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>HyperFilter</name><uri>http://www.blogger.com/profile/17384447918541676594</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>6</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4591647185267599189.post-5904175111400936715</id><published>2016-09-05T20:39:00.003-07:00</published><updated>2016-09-06T18:29:50.461-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DDoS Mitigation"/><category scheme="http://www.blogger.com/atom/ns#" term="DDoS Protection"/><category scheme="http://www.blogger.com/atom/ns#" term="featured"/><category scheme="http://www.blogger.com/atom/ns#" term="Online Games"/><category scheme="http://www.blogger.com/atom/ns#" term="UDP Attack Scripts"/><category scheme="http://www.blogger.com/atom/ns#" term="UDP DDoS Attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="UDP Games"/><title type='text'>UDP - DDoS Protection</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzAeedkYNOrMB4L-qQC5pK9I36QtdYWR7uqi3okRL7XQ_I0P9rDQz71zZQGCd7g9dYmnTMmpta9uwgym49sgdRru4vrbOS_oPyJZmK7cSrBSZQh7h6mWk4ZQjUAOH9yfFJ89t8tlD3xzv2/s1600/Udp1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;161&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzAeedkYNOrMB4L-qQC5pK9I36QtdYWR7uqi3okRL7XQ_I0P9rDQz71zZQGCd7g9dYmnTMmpta9uwgym49sgdRru4vrbOS_oPyJZmK7cSrBSZQh7h6mWk4ZQjUAOH9yfFJ89t8tlD3xzv2/s200/Udp1.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
It is common knowledge that nowadays many developing companies, game publishers or even independent developers tends to choose &lt;b&gt;UDP Protocol&lt;/b&gt; as their standard for their internet driven applications.&lt;br /&gt;
&lt;br /&gt;
Although, compared with the &lt;b&gt;TCP Protocol&lt;/b&gt;, the &lt;b&gt;UDP Protocol&lt;/b&gt; does have its advantages and disadvantages, and we can (to enlighten the readers), enumerate a few of them here:&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Key Advantages:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;- &lt;b&gt;Low latency&lt;/b&gt; between data exchange in both endpoints (server / client).&lt;/li&gt;
&lt;li&gt;- &lt;b&gt;High flexibility&lt;/b&gt; in protocol development.&lt;/li&gt;
&lt;li&gt;- &lt;b&gt;Connection less&lt;/b&gt; protocol, direct data exchange between both endpoints (server / client).&lt;/li&gt;
&lt;li&gt;- Perfect for &lt;b&gt;voice/video streaming&lt;/b&gt; based applications, or &lt;b&gt;latency sensitive games&lt;/b&gt; (generally FPS in most cases).&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Key Disadvantages:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;- Since it is a connection less protocol, there is &lt;b&gt;no session validation&lt;/b&gt; between connections, it means at any time one may start data transmission without passing through a handshake algorithm like TCP.&lt;/li&gt;
&lt;li&gt;- &lt;b&gt;No packet ordering&lt;/b&gt; guaranteed, this must be implemented and handled by the developer itself, while in TCP this is a mature feature, ensuring all packets are received in the same order as they have originated from the source.&lt;/li&gt;
&lt;li&gt;- &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Vulnerabilities of all types&lt;/span&gt;&lt;/b&gt; when it comes to &lt;b&gt;DDoS Attacks&lt;/b&gt;, either by the written applications acting as amplification vector for DDoS Attacks or being a target from these vectors (Such as DNS Amplification, NTP Amplification, Chargen Amplification, SNMP Amplification and much more, as there are dozens of vulnerable computers on the internet, ready to be used as amplification vectors). Also, still on this subject, these applications are often target of customized attacks, coded targeting the application in order to either cause resource exhaustion at the server-side or even a complete downtime. It is important to say, that while TCP adds a response time overhead in it&#39;s packet transmissions, it is much safer than UDP in these matters, due to the protocol design itself, removing this responsibility from the developers back.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;An example of a customized/scripted UDP DDoS Attack towards a TeamSpeak voice server:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqW6IXYWm-7ljbKpmBWaRPSKs2saMYWQwd8hu80FIqrpPmXXKx0DTaDqxbgd4lSb5LFT1YuBdStrEVbgY40RsDLTddLgx8c2wUpDIbMi2qxJYVffOXtm0GHzfeqsxB3hARgqQUVG1COfaJ/s1600/UDP-TS-Attack.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqW6IXYWm-7ljbKpmBWaRPSKs2saMYWQwd8hu80FIqrpPmXXKx0DTaDqxbgd4lSb5LFT1YuBdStrEVbgY40RsDLTddLgx8c2wUpDIbMi2qxJYVffOXtm0GHzfeqsxB3hARgqQUVG1COfaJ/s1600/UDP-TS-Attack.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;The solution:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Nowadays, we (&lt;a href=&quot;https://www.hyperfilter.com/&quot; target=&quot;_blank&quot;&gt;HyperFilter&lt;/a&gt;), are working in our own DDoS Appliances, focused in &lt;b&gt;helping the developers&lt;/b&gt; which depends/require of the usage of UDP Protocol based applications. We&#39;re capable in conjunction with them, to &lt;b&gt;add behavior detection techniques&lt;/b&gt; in the middle of the communication and &quot;identify&quot; and &quot;separate&quot; the real user traffic, from forged/spoofed custom attacks, keeping their applications stable.&lt;br /&gt;
&lt;br /&gt;
If you are running in troubles with UDP based DDoS Attacks, we are open to discuss with you, implementation plans, to improve and solve these issues in your corporation, keeping your business project rock solid, while you &lt;b&gt;focus in the real objective&lt;/b&gt;, which is your business by itself. :)&lt;br /&gt;
&lt;br /&gt;
Our engineering support team will always be &lt;b&gt;looking forward to help you&lt;/b&gt; in any sort issues you may incur related to these types of attacks.</content><link rel='replies' type='application/atom+xml' href='http://blog.hyperfilter.com/feeds/5904175111400936715/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.hyperfilter.com/2016/09/udp-ddos-protection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default/5904175111400936715'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default/5904175111400936715'/><link rel='alternate' type='text/html' href='http://blog.hyperfilter.com/2016/09/udp-ddos-protection.html' title='UDP - DDoS Protection'/><author><name>HyperFilter</name><uri>http://www.blogger.com/profile/17384447918541676594</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzAeedkYNOrMB4L-qQC5pK9I36QtdYWR7uqi3okRL7XQ_I0P9rDQz71zZQGCd7g9dYmnTMmpta9uwgym49sgdRru4vrbOS_oPyJZmK7cSrBSZQh7h6mWk4ZQjUAOH9yfFJ89t8tlD3xzv2/s72-c/Udp1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4591647185267599189.post-4012841969784470446</id><published>2014-10-16T16:01:00.002-07:00</published><updated>2014-10-16T16:03:31.883-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerabilities"/><title type='text'>POODLE Security Vulnerability Breaks SSLv3 Secure Browsing</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxARoRbAR4gLzi5W_6CZ0WvaWIraJFH-lJoPemXioVnKqSOnUYfb4QS_q293QshtJxUeyjfCKr5KGP1s8UR8HCsmOnWQdxLD54a8Lbs0Vf1sIbIlMWlubujCMQP8MUJIoLWxr2s-SSb4jj/s1600/brook-4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxARoRbAR4gLzi5W_6CZ0WvaWIraJFH-lJoPemXioVnKqSOnUYfb4QS_q293QshtJxUeyjfCKr5KGP1s8UR8HCsmOnWQdxLD54a8Lbs0Vf1sIbIlMWlubujCMQP8MUJIoLWxr2s-SSb4jj/s1600/brook-4.png&quot; height=&quot;268&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
A bug has been found in the&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0.2C_2.0_and_3.0&quot; style=&quot;color: #72a826; text-decoration: none;&quot;&gt;Secure Sockets Layer (SSL) 3.0 cryptography protocol&lt;/a&gt;&amp;nbsp;(SSLv3) which&amp;nbsp;&lt;a href=&quot;http://thenextweb.com/google/2014/10/15/web-encryption-vulnerability-opens-encrypted-data-hackers/&quot; style=&quot;color: #72a826; text-decoration: none;&quot;&gt;could be exploited to intercept data that’s supposed to be encrypted between computers and servers&lt;/a&gt;. Three Google security researchers discovered the flaw and detailed how it could be exploited through what they called a&amp;nbsp;&lt;a href=&quot;https://www.openssl.org/~bodo/ssl-poodle.pdf&quot; style=&quot;color: #72a826; text-decoration: none;&quot;&gt;Padding Oracle On Downgraded Legacy Encryption (POODLE) attack&lt;/a&gt;&amp;nbsp;(&lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566&quot; style=&quot;color: #72a826; text-decoration: none;&quot;&gt;CVE-2014-3566&lt;/a&gt;).&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
It is important to note that this is&amp;nbsp;&lt;strong&gt;NOT a flaw in SSL certificates,&amp;nbsp;&lt;/strong&gt;their private keys, or their design but in the old SSLv3 protocol.&amp;nbsp; SSL Certificates are not affected and customers with certificates on servers supporting SSL 3.0 do not need to replace them.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
It’s believed to not be as serious as the Heartbleed bug in OpenSSL,&amp;nbsp;since the attacker needs to have a privileged position in the network to exploit the latest.&amp;nbsp; The usage of Hotspots, public Wi-Fi, makes this attack a real problem. This type of attack falls into the “Man-in-the-middle” category.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
&lt;strong&gt;Background&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
&lt;img alt=&quot;brook-4.png&quot; src=&quot;http://www.symantec.com/connect/sites/default/files/users/user-30201/brook-4.png&quot; style=&quot;border: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
While SSL 3.0 was introduced in 1996, it is currently supported by nearly 95% of Web browsers according to&lt;a href=&quot;http://news.netcraft.com/&quot; style=&quot;color: #72a826; text-decoration: none;&quot;&gt;Netcraft’s&amp;nbsp;latest report&lt;/a&gt;. &amp;nbsp;Many Transport Layer Socket (TLS) clients downgrade their cryptography protocol&amp;nbsp;to SSL 3.0 when working with legacy servers. According to Google, an attacker that controls the network between the computer and server could interfere&amp;nbsp;with the handshake process used to verify which cryptography protocol the server can accept using a “protocol downgrade dance”. This will force computers to use the older SSL 3.0 protocol to protect data that is being sent. Attackers can then exploit the bug by carrying out a&amp;nbsp;&lt;a href=&quot;http://en.wikipedia.org/wiki/Man-in-the-middle_attack&quot; style=&quot;color: #72a826; text-decoration: none;&quot;&gt;man-in-the-middle (MITM) attack&lt;/a&gt;&amp;nbsp;to decrypt secure HTTP cookies, which could let them steal information or take control of the victim’s online accounts.&amp;nbsp; Although, at the time to writing, webmasters have been disabling moving to TLSv1 and above and a rapid pace, there still remains a lot of work to be done.&amp;nbsp; If Heartbleed taught us anything, it’s that the largest companies act fast while many small companies drag their heels in patching critical vulnerabilities.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
&lt;strong&gt;What Businesses Need to Do&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
In order to mitigate the bug there are a few courses of action:&lt;/div&gt;
&lt;ol style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin: 0.25em 0px 0.5em 2.5em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px; padding: 0px 0px 0px 0.5em;&quot;&gt;Check to see if your webservers are vulnerable using&amp;nbsp;&lt;a href=&quot;https://ssltools.websecurity.symantec.com/checker/views/certCheck.jsp&quot; style=&quot;color: #72a826; text-decoration: none;&quot;&gt;our free SSL Toolbox&lt;/a&gt;.&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px 0px 0px 0.5em;&quot;&gt;Use tools that support&amp;nbsp;&lt;a href=&quot;https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00&quot; style=&quot;color: #72a826; text-decoration: none;&quot;&gt;TLS_FALLBACK_SCSV&lt;/a&gt;, a mechanism that prevents attackers from forcing Web browsers to use SSL 3.0.&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px 0px 0px 0.5em;&quot;&gt;Disable SSL 3.0 altogether, or disable SSL 3.0 CBC-mode ciphers&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px 0px 0px 0.5em;&quot;&gt;A cloud-based Web Application Firewall can help protect against this kind of vulnerability.&amp;nbsp; For more information please&amp;nbsp;&lt;a href=&quot;http://www.incapsula.com/lp/website-security-and-acceleration-for-symantec-customers.html&quot; style=&quot;color: #72a826; text-decoration: none;&quot;&gt;visit our website&lt;/a&gt;.&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px 0px 0px 0.5em;&quot;&gt;Be leery of any spam messages from scammers trying to capitalize on uncertainty and a lack of technical knowledge.&lt;/li&gt;
&lt;/ol&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
A few tips on how to fix this on Apache:&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
&amp;gt; SSLProtocol All -SSLv2 -SSLv3&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;-&amp;nbsp;&lt;em&gt;Removes SSLv2 and SSLv3&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
&amp;gt; apachectl configtest&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;lt;-&amp;nbsp;&lt;em&gt;Test your configuration&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
&amp;gt; sudo service apache restart&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;lt;-&amp;nbsp;&lt;em&gt;Restart server&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
Google added that it will remove SSL 3.0 support from all of its products in the next few months. Mozilla also said&amp;nbsp;&lt;a href=&quot;https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/&quot; style=&quot;color: #72a826; text-decoration: none;&quot;&gt;it would disable SSL 3.0 in FireFox 34&lt;/a&gt;, which will be released at the end of November.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
&lt;strong&gt;What End-Users Need to Do&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin-bottom: 0.75em; margin-top: 0.75em; padding: 0px;&quot;&gt;
For end-users accessing websites Symantec recommends:&lt;/div&gt;
&lt;ol style=&quot;background-color: white; color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: 13px; line-height: 19.5px; margin: 0.25em 0px 0.5em 2.5em; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px; padding: 0px 0px 0px 0.5em;&quot;&gt;Check to see if SSL 3.0 is disabled on your browser (for example, in Internet Explorer it is under Internet Options, Advanced Settings).&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px 0px 0px 0.5em;&quot;&gt;Avoid MITM attacks by making sure “HTTPS” is always on the websites you visit.&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px 0px 0px 0.5em;&quot;&gt;Monitor any notices from the vendors you use regarding recommendations to update software or passwords.&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px 0px 0px 0.5em;&quot;&gt;Avoid potential phishing emails from attackers asking you to update your password – to avoid going to an impersonated website, stick with the official site domain.&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
&lt;span style=&quot;color: #333333; font-family: helvetica, arial, clean, sans-serif; font-size: x-small;&quot;&gt;&lt;span style=&quot;line-height: 19.5px;&quot;&gt;Source: symantec&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://blog.hyperfilter.com/feeds/4012841969784470446/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.hyperfilter.com/2014/10/poodle-security-vulnerability-breaks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default/4012841969784470446'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default/4012841969784470446'/><link rel='alternate' type='text/html' href='http://blog.hyperfilter.com/2014/10/poodle-security-vulnerability-breaks.html' title='POODLE Security Vulnerability Breaks SSLv3 Secure Browsing'/><author><name>HyperFilter</name><uri>http://www.blogger.com/profile/17384447918541676594</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxARoRbAR4gLzi5W_6CZ0WvaWIraJFH-lJoPemXioVnKqSOnUYfb4QS_q293QshtJxUeyjfCKr5KGP1s8UR8HCsmOnWQdxLD54a8Lbs0Vf1sIbIlMWlubujCMQP8MUJIoLWxr2s-SSb4jj/s72-c/brook-4.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4591647185267599189.post-3825388562702003566</id><published>2014-08-16T06:48:00.002-07:00</published><updated>2014-08-16T06:50:39.272-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Internet routing 512K limitation</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSz0DF7tZt49-nPlIbG_veGsOpsEhSYZVTozk0MwLKqKGNjb2Ht3NCdD7vUlmbtnMWwvPmD72OeRG32KVJj-bcZuFm-hPw7Lx4pDKWLXTt4QeNAGvCB2MhYBFyP7MzHPzn_8eH9vyleVpI/s1600/BN-EC006_Router_G_20140813104133.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSz0DF7tZt49-nPlIbG_veGsOpsEhSYZVTozk0MwLKqKGNjb2Ht3NCdD7vUlmbtnMWwvPmD72OeRG32KVJj-bcZuFm-hPw7Lx4pDKWLXTt4QeNAGvCB2MhYBFyP7MzHPzn_8eH9vyleVpI/s1600/BN-EC006_Router_G_20140813104133.jpg&quot; height=&quot;213&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: #fefefe; color: #404041; font-family: Lato-Regular, arial, verdana, sans-serif; font-size: 14px; line-height: 19.600000381469727px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;In the past two years we have been individually updating our clients about the (possible and most likely) upcoming issues with the internet.&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;Most people and companies were afraid off the issues year 2K might bring due to the possible bugs in software. Others got scared because of the major Cisco and Juniper router bugs that occurred in the past years, which brought down a large portion of the internet. And then there are some people that are always scared I guess...&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;Anyways, now the time has come that the internet will actually start to cripple and become unstable for a couple of weeks. This is what we have been warning many clients and other ISP about in the past years. Many have acted upon this, but we can say for sure that most have not acted yet.&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;In the past years everyone heard (or should have) about the depletion of the IPv4 address space. Registries such as RIPE, who distribute those address blocks, thought it was a smart move to start and limit the size of each subnet that they distribute to their members who request additional address space. This has resulted in many subnet sizes of a /22 (1024 IP addresses) up to a /24 (256 IP addresses) to be distributed. Providers need to use these subnets across their infrastructure and as many providers have their infrastructure widely spread, this required them to divide those subnets into smaller portions, blocks. This is normal behavior, however as the subnets they received were already very small, there was not much to divide. Providers had to start dividing them into the smallest blocks possible that is allowed to be routed on the internet, which are /24&#39;s (256 addresses).&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;Up till a few years ago, there were about 400K routes active on the internet (see reference 1). Since last Tuesday we have reached over 512K routes. This poses a serious problem all over the internet as many routers have hardware limit of 512K routes that can be installed in their forwarding table of their line-cards. Every brand and type of router will act differently when this limit is hit. We have seen Cisco routers crash/reload (continuously). And other routers just not installing new routes, causing unavailability of parts of the internet. Last Tuesday we have been given a preview of these issues. Major providers like Level 3, AT&amp;amp;T, Cogent, Sprint and Verizon were having serious issues. And surely there were many more that should be added to this list.&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;The crashes and other issues will be seen in the coming weeks all over the internet. We expect that from time to time there will be, as we call it, BGP flaps all over the internet. This will cause routes to changes back and forth for a few minutes or even hours, which on its turn could cause a domino effect or at least a non-optimal set of routes on the internet.&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;It could be that many people will not notice this. But if you can not reach your local bank website, your company email or you just cannot reach your girlfriend by phone... Think about what we have said. And do not blame your local ISP -just yet-, as it can be very much any of the other 70.000 Internet Service Providers out there. Anyone provider that has been given an AS (Autonomous System) number and is between you and your destination (and/or back) can be causing these issues. Just wait a minute and retry.&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;We can now officially call the 12th of August 2014, the &quot;512k day&quot; (reference 5).&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;References:&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;1. CIDR Active BGP entries (FIB): http://www.cidr-report.org/cgi-bin/plota?file=/var/data/bgp/as2.0/bgp-active.txt&amp;amp;descr=Active BGP entries (FIB)&amp;amp;ylabel=Active BGP entries (FIB)&amp;amp;with=step&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;2. http://online.wsj.com/articles/y2k-meets-512k-as-internet-limit-approaches-1407937617&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;3. http://www.renesys.com/2014/08/internet-512k-global-routes/&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;4. http://arstechnica.com/security/2014/08/internet-routers-hitting-512k-limit-some-become-unreliable/&lt;/span&gt;&lt;br style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot; /&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;5. http://en.wikipedia.org/wiki/512K&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;span style=&quot;background-color: #fefefe; color: #404041; line-height: 19.600000381469727px;&quot;&gt;6.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #404041;&quot;&gt;&lt;span style=&quot;line-height: 19.600000381469727px;&quot;&gt;https://noc.nforce.com/notifications/informational&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.hyperfilter.com/feeds/3825388562702003566/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.hyperfilter.com/2014/08/internet-routing-512k-limitation.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default/3825388562702003566'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default/3825388562702003566'/><link rel='alternate' type='text/html' href='http://blog.hyperfilter.com/2014/08/internet-routing-512k-limitation.html' title='Internet routing 512K limitation'/><author><name>HyperFilter</name><uri>http://www.blogger.com/profile/17384447918541676594</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSz0DF7tZt49-nPlIbG_veGsOpsEhSYZVTozk0MwLKqKGNjb2Ht3NCdD7vUlmbtnMWwvPmD72OeRG32KVJj-bcZuFm-hPw7Lx4pDKWLXTt4QeNAGvCB2MhYBFyP7MzHPzn_8eH9vyleVpI/s72-c/BN-EC006_Router_G_20140813104133.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4591647185267599189.post-536548319323832602</id><published>2014-08-10T15:22:00.000-07:00</published><updated>2014-08-10T15:47:33.004-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DDoS Attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerabilities"/><category scheme="http://www.blogger.com/atom/ns#" term="WordPress"/><title type='text'>WordPress sites used for DDoS attacks with XML-RPC PingBack Vulnerability</title><content type='html'>&lt;div class=&quot;entry-body&quot; style=&quot;background-color: white; clear: both; padding-right: 20px;&quot;&gt;
&lt;div class=&quot;entry-body&quot; style=&quot;clear: both; color: #333333; line-height: 14pt; padding-right: 20px;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-family: Helvetica, Verdana, &#39;Arial sans-serif&#39;; font-size: 11pt; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikcELY1GcQCZbaHd82N4Ee0MezFiG4kEzRzq9VBek1pfoOwH99sDrKf1XNlXhjTd4lYCIzl2zSb6HHLqLEK7SXP5q9ODPzxsZ1m2iJ22TYZovjvczIHD3vrXnxa_yijI9aHd6ECIRrwqzR/s1600/wordpress-ddos.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikcELY1GcQCZbaHd82N4Ee0MezFiG4kEzRzq9VBek1pfoOwH99sDrKf1XNlXhjTd4lYCIzl2zSb6HHLqLEK7SXP5q9ODPzxsZ1m2iJ22TYZovjvczIHD3vrXnxa_yijI9aHd6ECIRrwqzR/s1600/wordpress-ddos.jpg&quot; height=&quot;166&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 11pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;There were&amp;nbsp;&lt;a href=&quot;http://www.net-security.org/secworld.php?id=17227&quot; style=&quot;color: #0099ff;&quot; target=&quot;_blank&quot;&gt;news stories this week&lt;/a&gt;&amp;nbsp;outlining how attackers are&amp;nbsp;&lt;a href=&quot;http://blog.sucuri.net/2014/03/more-than-162000-wordpress-sites-used-for-distributed-denial-of-service-attack.html&quot; style=&quot;color: #0099ff;&quot; target=&quot;_self&quot;&gt;abusing the XML-PRC &quot;pingback&quot; feature of WordPress blog sites to launch DDoS attacks&amp;nbsp;&lt;/a&gt;on other sites. &amp;nbsp;This blog post will provide some analysis on this attack and additional information for websites to protect themselves.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;a href=&quot;https://www.blogger.com/null&quot; id=&quot;more&quot; style=&quot;color: #0099ff; line-height: normal; text-decoration: underline;&quot;&gt;&lt;/a&gt;&lt;span style=&quot;line-height: normal;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;entry-more&quot; style=&quot;clear: both;&quot;&gt;
&lt;h1 style=&quot;color: #333333; line-height: 14pt; margin-bottom: 10px; margin-top: 10px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;b&gt;Not A New Vulnerabilty&lt;/b&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;The vulnerability in WordPress&#39;s XML-RPC API is not new. &amp;nbsp;Here is&amp;nbsp;&lt;a href=&quot;https://core.trac.wordpress.org/ticket/4137&quot; style=&quot;color: #0099ff;&quot; target=&quot;_self&quot;&gt;data from the WordPress bug tracker&lt;/a&gt;&amp;nbsp;from 7 years ago.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: #333333; line-height: 14pt; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoO2ADexjv1jBzEe2xtRswhN1DnMsg0WdXtggb27-tje6KdlIcLnXKJaSgGrogRODUb4bTeZlsbqltl2bBZISFSdyOjS-xQbsiLm_uwvhHsEjOBB2AQZ9THrXTYtqhvJhXMbLNtYFjVIH9/s1600/01.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoO2ADexjv1jBzEe2xtRswhN1DnMsg0WdXtggb27-tje6KdlIcLnXKJaSgGrogRODUb4bTeZlsbqltl2bBZISFSdyOjS-xQbsiLm_uwvhHsEjOBB2AQZ9THrXTYtqhvJhXMbLNtYFjVIH9/s1600/01.png&quot; height=&quot;305&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;While the vulnerability itself is not new, it has only been within the past couple years that attack code/tools have&amp;nbsp;&lt;a href=&quot;https://github.com/FireFart/WordpressPingbackPortScanner&quot; style=&quot;color: #0099ff;&quot; target=&quot;_self&quot;&gt;been made available&lt;/a&gt;. &amp;nbsp;This has certainly helped increase attacks by ScriptKiddies and resulted in more&amp;nbsp;&lt;a href=&quot;http://www.incapsula.com/blog/wordpress-security-alert-pingback-ddos.html&quot; style=&quot;color: #0099ff;&quot; target=&quot;_self&quot;&gt;actual DDoS attacks&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;h1 style=&quot;color: #333333; line-height: 14pt; margin-bottom: 10px; margin-top: 10px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;b&gt;WordPress XML-RPC Pingback DDoS Attack Walkthrough&lt;/b&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;The XML-RPC&amp;nbsp;&lt;a href=&quot;http://codex.wordpress.org/Introduction_to_Blogging#Using_Pingbacks_and_Trackbacks&quot; style=&quot;color: #0099ff;&quot; target=&quot;_self&quot;&gt;pingback functionality has a legitimate purpose&lt;/a&gt;&amp;nbsp;with regards to linking blog content from different authors. &amp;nbsp;The issue is that this functionality can be abuse by attackers to use the XML-RPC pingback feature of a blog site to attack a 3rd party site.&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;color: #333333; font-weight: normal; line-height: 14pt; margin-bottom: 10px; margin-top: 10px;&quot;&gt;
&lt;span style=&quot;line-height: 14pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style=&quot;color: #333333; line-height: 14pt; margin-bottom: 10px; margin-top: 10px;&quot;&gt;
&lt;span style=&quot;line-height: 14pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;b&gt;WordPress XML-RPC Pingback DDoS attack&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;Here is an example attack command using curl -&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: #333333; line-height: 14pt; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGJCZGSeBs3mfid3XKSvm8nZo3a58HnhFh5PrqlUBnn-eEXv7zTqEJq4agFFmMliaSZHjWvY-y9cYG3x-DH5zT3P66Xd1dpraZ6YW1p7KpRG5T1cEoW0yMzCtCGl1rycYkTtubohk6MM5r/s1600/03.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGJCZGSeBs3mfid3XKSvm8nZo3a58HnhFh5PrqlUBnn-eEXv7zTqEJq4agFFmMliaSZHjWvY-y9cYG3x-DH5zT3P66Xd1dpraZ6YW1p7KpRG5T1cEoW0yMzCtCGl1rycYkTtubohk6MM5r/s1600/03.png&quot; height=&quot;88&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;The YELLOW highlighted data is a WordPress &quot;Patsy Proxy&quot; site while teh ORANGE highlighted data is the target/victim website. &amp;nbsp;It is important to note for testing purposes that you must include the &quot;&lt;em&gt;&lt;strong&gt;Content-Type: text/xml&lt;/strong&gt;&lt;/em&gt;&quot; request header data otherwise the XML-RPC service will not treat the request as valid and will issue the following response:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: #333333; line-height: 14pt; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi919SX6PXcQTFgvkujn_GJFllFqYtCz6eDwwCg5vwct3MOc9lDu9Cf_94epCG9W8y1MHAL5qsEqq_Gw2UOfGeHVvg6n1Fy37QkaCajO4qxGkJshNsRmE_jLNmSEIHQ_SiHrQMmTf-QR8yJ/s1600/04.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi919SX6PXcQTFgvkujn_GJFllFqYtCz6eDwwCg5vwct3MOc9lDu9Cf_94epCG9W8y1MHAL5qsEqq_Gw2UOfGeHVvg6n1Fy37QkaCajO4qxGkJshNsRmE_jLNmSEIHQ_SiHrQMmTf-QR8yJ/s1600/04.png&quot; height=&quot;148&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;With the previous request sent by the attacker, the Patsy Proxy WordPress site then initiates this HTTP request to the target/victim site -&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: #333333; line-height: 14pt; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdATx5VNClCJKksk5SCIOoqF7nCAnJVaZEkl_cCc2ylWD1JJocQQsxHi-67YTeGp1zh1zAYV32DW0ssYUrlQWubdTnedEjtw9iAWPcsMfTF4YRwek7nrJrYoIKIMjbfOatZAsFK-UwExxm/s1600/05.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdATx5VNClCJKksk5SCIOoqF7nCAnJVaZEkl_cCc2ylWD1JJocQQsxHi-67YTeGp1zh1zAYV32DW0ssYUrlQWubdTnedEjtw9iAWPcsMfTF4YRwek7nrJrYoIKIMjbfOatZAsFK-UwExxm/s1600/05.png&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;Notice that the format of the HTTP request is&amp;nbsp;&lt;em&gt;&lt;strong&gt;only two lines&lt;/strong&gt;&lt;/em&gt;:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px; line-height: 14pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #2b2b2b; font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;•&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px; line-height: 14pt;&quot;&gt;URI&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #2b2b2b; font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;•&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px; line-height: 14pt;&quot;&gt;Host request header&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;This intelligence can be used by Web Application Firewalls (WAFs) that are protecting the victim sites to identify attack requests. &amp;nbsp;Normal web browsers send many more request headers. &amp;nbsp;While the pingback DDoS attack doesn&#39;t utilize any type of amplification as other more recent network protocol attacks (e.g. NTP), requests can cause more damage on the victim site if the URI is initiating a computationally expensive back-end query or process.&lt;/span&gt;&lt;/div&gt;
&lt;h1 style=&quot;color: #333333; line-height: 14pt; margin-bottom: 10px; margin-top: 10px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;b&gt;Protections&amp;nbsp;&lt;span style=&quot;line-height: 14pt;&quot;&gt;Disable XML-RPC&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;It is possible to disable the XML-RPC process altogether if you do not want to use it. &amp;nbsp;There are&amp;nbsp;&lt;a href=&quot;http://wordpress.org/plugins/prevent-xmlrpc/&quot; style=&quot;color: #0099ff;&quot; target=&quot;_self&quot;&gt;even plugins that will disable it.&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;span style=&quot;color: #333333;&quot;&gt;Also there is a plugin for to make your wordpress faster and more secure:&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://wordpress.org/plugins/wordfence/&quot; style=&quot;color: #0099ff;&quot; target=&quot;_blank&quot;&gt;https://wordpress.org/plugins/wordfence/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h2 style=&quot;color: #333333; line-height: 14pt; margin-bottom: 10px; margin-top: 10px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;b&gt;Disable Pingback Requests&lt;/b&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;You may also disable the pingback feature by adding the following to your functions.php file:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: #333333; line-height: 14pt; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixy6mH56eHVuI60k3CWqY8pATZzaAi3ZW-0AB-ecikg_RYIEE_onqKbNMzgV-bsBNL4EGkqk-6UR1jWXBHia4HCPtJJO4yxkCWIXQJXPG8SpyDjjvE_0vifuXFKD-ywhqMeygeGXcPZWxm/s1600/06.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixy6mH56eHVuI60k3CWqY8pATZzaAi3ZW-0AB-ecikg_RYIEE_onqKbNMzgV-bsBNL4EGkqk-6UR1jWXBHia4HCPtJJO4yxkCWIXQJXPG8SpyDjjvE_0vifuXFKD-ywhqMeygeGXcPZWxm/s1600/06.png&quot; height=&quot;57&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; line-height: 14pt; margin-bottom: 15px; margin-top: 15px;&quot;&gt;
&lt;span style=&quot;line-height: 14pt;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif; font-size: 12px;&quot;&gt;source: spiderlabs&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://blog.hyperfilter.com/feeds/536548319323832602/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.hyperfilter.com/2014/08/wordpress-sites-used-for-ddos-attacks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default/536548319323832602'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default/536548319323832602'/><link rel='alternate' type='text/html' href='http://blog.hyperfilter.com/2014/08/wordpress-sites-used-for-ddos-attacks.html' title='WordPress sites used for DDoS attacks with XML-RPC PingBack Vulnerability'/><author><name>HyperFilter</name><uri>http://www.blogger.com/profile/17384447918541676594</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikcELY1GcQCZbaHd82N4Ee0MezFiG4kEzRzq9VBek1pfoOwH99sDrKf1XNlXhjTd4lYCIzl2zSb6HHLqLEK7SXP5q9ODPzxsZ1m2iJ22TYZovjvczIHD3vrXnxa_yijI9aHd6ECIRrwqzR/s72-c/wordpress-ddos.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4591647185267599189.post-1674881105603042211</id><published>2014-08-06T17:30:00.007-07:00</published><updated>2014-08-16T09:55:14.639-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DDoS Attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>DDoS Attacks against Israel</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPp_2unOiCaundi1yFie1WJR7i96wZZb6M8Bsi9abug6OJQzy0H28YTEJlIlaeRqkfbmBUwSSr3gdTu5CaWLVLkcrU0aW5qUg8_sRtX2BUBhwexmFTieZf-vPkNhQ0k0Zc5EVmlWIQ6BDH/s1600/3713483211.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPp_2unOiCaundi1yFie1WJR7i96wZZb6M8Bsi9abug6OJQzy0H28YTEJlIlaeRqkfbmBUwSSr3gdTu5CaWLVLkcrU0aW5qUg8_sRtX2BUBhwexmFTieZf-vPkNhQ0k0Zc5EVmlWIQ6BDH/s1600/3713483211.jpg&quot; height=&quot;185&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot;&gt;Hacking attempts against Israeli networks and servers increased more than five-fold during the war in Gaza, according to a report released this week by network security specialists Arbor Networks.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot; /&gt;
&lt;span style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot;&gt;Just about all the attacks were Denial of Service (DDOS) attacks, in which the hackers attempt to overwhelm and shut down a server by directing an unsustainable volume of requests at it.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot; /&gt;
&lt;span style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot;&gt;The volume of attacks began to rise in the first week of July, going from an average of 30 attacks per day in June to 150 attacks per day in July. The onslaught peaked on July 21, when 429 attacks were recorded.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot; /&gt;
&lt;span style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot;&gt;Attacks dropped precipitously on July 28, the day that an ultimately unsuccessful cease-fire was due to go into effect, and started rising again on August 3.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot; /&gt;
&lt;span style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot;&gt;Not only the number of attacks was unprecedented during July. They were also unusual in size (the traffic directed at a specific server) and duration.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot; /&gt;
&lt;span style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot;&gt;In June, no attack exceeded 12 Gbps. In July, seven attacks exceeded 12 Gbps, with the largest peaking at 22.56 Gbps on July 12.. The largest attack of all – at 29 Gbps – came on August 3, after cease-fire talks collapsed.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot; /&gt;
&lt;span style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot;&gt;The average duration of an attack in June was 20 minutes with a peak duration of 24 hours. In July, the average duration was one hour and 39 minutes. An attack launched on July 19 was still in progress when the report was written, after approximately two weeks.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot; /&gt;
&lt;span style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot;&gt;The report concludes that the number, size and duration of the DDoS attacks targeting Israel were proportional to the intensity of the conflict. The attackers, it says, appear to have made an effort to adhere to the “real world” calls for a cease-fire, resuming their attacks when the cease-fire ended or collapsed.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot; /&gt;
&lt;span style=&quot;background-color: white; font-family: Georgia; font-size: 14px; line-height: 20px;&quot;&gt;In all, Israel was targeted by 5,346 DDOS attacks during the duration of the fighting.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.hyperfilter.com/feeds/1674881105603042211/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.hyperfilter.com/2014/08/ddos-attacks-against-israel.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default/1674881105603042211'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default/1674881105603042211'/><link rel='alternate' type='text/html' href='http://blog.hyperfilter.com/2014/08/ddos-attacks-against-israel.html' title='DDoS Attacks against Israel'/><author><name>HyperFilter</name><uri>http://www.blogger.com/profile/17384447918541676594</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPp_2unOiCaundi1yFie1WJR7i96wZZb6M8Bsi9abug6OJQzy0H28YTEJlIlaeRqkfbmBUwSSr3gdTu5CaWLVLkcrU0aW5qUg8_sRtX2BUBhwexmFTieZf-vPkNhQ0k0Zc5EVmlWIQ6BDH/s72-c/3713483211.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4591647185267599189.post-3062373592328425340</id><published>2014-08-06T17:29:00.003-07:00</published><updated>2016-09-05T20:42:18.397-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DDoS Mitigation"/><category scheme="http://www.blogger.com/atom/ns#" term="DDoS Protection"/><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>New dedicated servers with DDoS Protection</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFC4SKSA7WT3Bcz4FL4b_avqnIFLkrPPFWczVDTfdLmo9mT2bS7fe3Yg_876QRSWZ1VfwurPVKnZl34NXsV1kUwri4V50gxlkBxvmXfyi_QXjUhuE2G69aPw7oFOimJE8-YkcfXvs-UVXB/s1600/hfmed.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFC4SKSA7WT3Bcz4FL4b_avqnIFLkrPPFWczVDTfdLmo9mT2bS7fe3Yg_876QRSWZ1VfwurPVKnZl34NXsV1kUwri4V50gxlkBxvmXfyi_QXjUhuE2G69aPw7oFOimJE8-YkcfXvs-UVXB/s1600/hfmed.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;Its a pleasure to a&lt;span style=&quot;color: #2b2b2b;&quot;&gt;nnounce our new protected dedicated servers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br /&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;Location: Amsterdam, Netherlands&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px;&quot;&gt;&lt;span style=&quot;color: darkorange;&quot;&gt;• Xeon E3-1240v3 16GB&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• 16 GB RAM Advanced ECC&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• 2 x 500GB SATA II 7200 RPM&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• Hardware Raid 1&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• 20TB bandwidth Premium Bandwidth [Clean Traffic]&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• Network Port 1000 Mbps&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• DDoS Protection&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• $449.99/Month&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;a href=&quot;https://www.hyperfilter.com/panel/cart.php?a=add&amp;amp;pid=48&quot; style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: darkorange;&quot;&gt;• Order Now •&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&lt;span style=&quot;color: darkorange;&quot;&gt;• Xeon E3-1240v3 32GB&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• 32 GB RAM Advanced ECC&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• 2 x 500GB SATA II 7200 RPM&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• Hardware Raid 1&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• 20TB bandwidth Premium Bandwidth [Clean Traffic]&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• Network Port 1000 Mbps&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• DDoS Protection&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• $489.99/Month&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;a href=&quot;https://www.hyperfilter.com/panel/cart.php?a=add&amp;amp;pid=53&quot; style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: darkorange;&quot;&gt;• Order Now •&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&lt;span style=&quot;color: darkorange;&quot;&gt;• Xeon E3-1240v3 32GB SSD&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• 32 GB RAM Advanced ECC&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• 2 x 240GB SSD&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• Hardware Raid 1&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• 20TB bandwidth Premium Bandwidth [Clean Traffic]&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• Network Port 1000 Mbps&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• DDoS Protection&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;• $599.99/Month&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;a href=&quot;https://www.hyperfilter.com/panel/cart.php?a=add&amp;amp;pid=54&quot; style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: darkorange;&quot;&gt;• Order Now •&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;span style=&quot;color: darkorange; font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&lt;b&gt;Key Points:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;•&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&amp;nbsp;Low False Positive Rate (&amp;lt;=1%)&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;•&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&amp;nbsp;Always on Protection State&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;•&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px;&quot;&gt;The HyperFilter DDoS Protected Dedicated Servers, are branded hardware built by HP.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;•&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&amp;nbsp;They are placed in a redundant DoS/DDoS Protected network with multiple 10GE carriers providing the best connectivity.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;•&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&amp;nbsp;A DoS/DDoS Attack is mitigated nearly instantly, avoiding downtimes and side effects related with it.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;•&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&amp;nbsp;Quality is an important factor, our engineering team is always available for you.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;•&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&amp;nbsp;All kinds of DDoS attacks are mitigated into our systems and only the good traffic is allowed to pass.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;•&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&amp;nbsp;We aren’t resellers like the competition, we develop our mitigation technology daily, improving it day-by-day to become the most up to date and quality DDoS Protection available.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;•&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;verdana&amp;quot; , &amp;quot;geneva&amp;quot; , &amp;quot;lucida&amp;quot; , &amp;quot;lucida grande&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&amp;nbsp;You will be protected against any kind of DDoS Attack, being TCP, UDP, ICMP, ARP, Socket Flooding and so on.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;br style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #2b2b2b;&quot;&gt;
&lt;b style=&quot;font-family: verdana, geneva, lucida, &#39;lucida grande&#39;, arial, helvetica, sans-serif; font-size: 12px; line-height: normal;&quot;&gt;&lt;span style=&quot;color: darkorange;&quot;&gt;Please feel free to contact our Sales Live Chat for more informations.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://blog.hyperfilter.com/feeds/3062373592328425340/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.hyperfilter.com/2014/08/new-dedicated-servers-with-ddos.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default/3062373592328425340'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4591647185267599189/posts/default/3062373592328425340'/><link rel='alternate' type='text/html' href='http://blog.hyperfilter.com/2014/08/new-dedicated-servers-with-ddos.html' title='New dedicated servers with DDoS Protection'/><author><name>HyperFilter</name><uri>http://www.blogger.com/profile/17384447918541676594</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFC4SKSA7WT3Bcz4FL4b_avqnIFLkrPPFWczVDTfdLmo9mT2bS7fe3Yg_876QRSWZ1VfwurPVKnZl34NXsV1kUwri4V50gxlkBxvmXfyi_QXjUhuE2G69aPw7oFOimJE8-YkcfXvs-UVXB/s72-c/hfmed.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>