boriseng
Could be the hosting company's the target not CF?
From what I've read it is possible to track down the people behind these kinds of attack, just difficult as it requires the cooperation of a number of system administrators in the chain, especially if source addresses are spoofed.
Hopefully someone'll get bored and attack something else.
Aconan
Security: Try and hijack any information. Again well protected against that.
404thread
s'ok guys. Lets just counter-DDoS attack them with LOIC. I'll backtrace the IP if you post em here broonie, I took computer science III!
"Here chud monkey... have a ping of 999 for a few hours so i can get some bandwidth"
Winters
If it's a single IP then it's not a DDOS attack
Thats what stumps people and as a multi gig connection coming from a single IP through multiple routes on globally distributed WAN will hardly be a single IP in reality. Rather a spoofed packet flooding SYN requests to a single IP that is non existant, resulting in no ACK packages being returned to original sender (or some poor person).
Of course VMs are suspectible! Why else does the webserver go down all the time? This is not the case with this server, it's physical, layers 1-3 aren't emulated so to speakdraze
you can flood from a single IP. for example a server running Vmachines using the hosts IP as a VM bridge can technically send enough packets to flood a system. I've done it to my brothers just to piss him off while he's playing warcraft"Here chud monkey... have a ping of 999 for a few hours so i can get some bandwidth"