10 12, 2010

Detecting a distributed reflected DNS attack

By | 2010-12-10T15:52:57+00:00 December 10th, 2010|Cyber Crime, Firewall Analysis, How To, Log File Analysis, System Administration, Uncategorized, Vantage|0 Comments

The other night as I was getting ready to sleep, I received an email from the host of my personal Linux VPS saying that I had exceeded my monthly transfer quota. I didn't pay much mind to the warning, as the excess transfer was insignificant, and at that time I was too tired to care. I closed my email, got into bed and fell asleep.