Deutsch English Français Italiano |
<ut1foi$29aaf$1@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Don Y <blockedofcourse@foo.invalid> Newsgroups: sci.electronics.design Subject: Re: Chinese downloads overloading my website Date: Fri, 15 Mar 2024 05:42:50 -0700 Organization: A noiseless patient Spider Lines: 24 Message-ID: <ut1foi$29aaf$1@dont-email.me> References: <7qujui58fjds1isls4ohpcnp5d7dt20ggk@4ax.com> <6lekuihu1heui4th3ogtnqk9ph8msobmj3@4ax.com> <usec35$130bu$1@solani.org> <u14quid1e74r81n0ajol0quthaumsd65md@4ax.com> <usjiog$15kaq$1@solani.org> <t7rrui5ohh07vlvn5vnl277eec6bmvo4p9@4ax.com> <usm6v6$17e2c$1@solani.org> <gabuui56k0fn9iovps09um30lhiqhvc61t@4ax.com> <usqjih$h74g$1@dont-email.me> <afq1viha37gjs37sprgfb30dfm0m1ok5jh@4ax.com> <ustdn0$176f7$1@dont-email.me> <usv8fu$1nhtm$1@dont-email.me> <usvu8g$1slrq$2@dont-email.me> <ut1bm8$28gvp$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Fri, 15 Mar 2024 12:42:59 -0000 (UTC) Injection-Info: dont-email.me; posting-host="c86af28dc75bef790d14c8cfb4054056"; logging-data="2402639"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18fwacPFBO6Lbj4UldTpaTA" User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.2.2 Cancel-Lock: sha1:ANHFgsW/MAnU4ZzmsKGOMko+kPE= Content-Language: en-US In-Reply-To: <ut1bm8$28gvp$1@dont-email.me> Bytes: 2509 On 3/15/2024 4:33 AM, Peter wrote: > > Don Y <blockedofcourse@foo.invalid> wrote: > >> I operate a server in stealth mode; it won't show up on >> network probes so robots/adversaries just skip over the >> IP and move on to others. Folks who *should* be able to >> access it know how to "get its attention". > > Port knocking ;) Effectively, yes. It's a bit tedious to use -- and the server-side code is far from "standard" -- but it is great at stealth. I'm not sure how it would work in situations with lots of *intended* traffic, though... [I've been making little boxes with a NIC on one end, stack in the middle, and some form of communications I/O on the other (serial port, USB, GPIB, CAN, DMX, etc.). The stealth feature was one of the most requested capabilities (as it lets an interface be deployed and routed -- without fear of some hacker/script-kiddie stumbling onto it and dicking with the attached device).]