Quote:
Originally Posted by Phoenix 1337
Chernobyl was doing that ;( in his vmachine.
|
You should learn about networking '101', hehehe...
1) You can't limit the amount of bandwidth an IP will throw towards you.
2) You can't hide an IP, always an IP will have to be shown if you want to have 'any' communication happening at the "IP" protocol, IP = Internet Protocol by definition, and any protocol built on the top of the "IP", like ICMP, UDP or TCP, requires an IP Address.
3) You can't solve high DoS/DDoS attacks with a simple server or pc, first because the architecture of the hardware is not built for this amount of "I/O", second because they aren't able to handle that much requests simultaneosly, if you ever 'programmed/coded' anything you probably know about asynchronism and threading, the context switching methods and thread locking methods to synchronize everything in such evenvironment are your overheads, plus they take too much cpu time with each packet, hence why a single linux box, even with 16 or 32 cores, will handle like 300-400 Kpps max. You need "ASIC" hardware, they are independant semi-conductors that do their decision without depending on software, and this type of equipment, costs much more than you probably will earn in the next 15-30 years. :P