Category Archives capture
The ASA firewall is not a great choice in dealing with a volumetric DDOS, but they can come in handy with an application layer attack, such as a common HTTP POST/GET request from the attacker. Within the ASA, you can filter certain strings that may come from an application layer payload using the regex command. The following link provides some insight into…
Without rate limiting, the link can become saturated easily by one or two devices. To ensure smooth network performance, implement rate limiting to negate this from occurring. A good guide from Packet Pushers is available below. Use Rate-Limiting to Alleviate Link Saturation - Packet Pushers Podcast.
As a Private Pilot, I've always been interested in how helicopters work and perform under engine failure conditions. Below is a video which shows exactly what occurs in the event of the tail rotor failing. Intense! http://vimeo.com/115532128