you are viewing a single comment's thread.

view the rest of the comments →

[–]JerrySpringerSexToy 12 insightful - 2 fun12 insightful - 1 fun13 insightful - 2 fun -  (3 children)

what is a "fraudulent connection attempt" anyways?

[–]magnora7[S] 21 insightful - 3 fun21 insightful - 2 fun22 insightful - 3 fun -  (2 children)

It means that IP is trying to connect so many times per second that it's obviously not a human trying to view the website, basically. Like 10 to 10,000 times a second

[–]JerrySpringerSexToy 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (1 child)

ok.. first, I will openly admit that networking and networking security is not something that I know much about...

but I will say that I am an experienced programmer.. I have been writing code for 37 years and I have written web server applications and I have written web servers from scratch in c language.

for example, I am very fond of beej's documentation about how to write sockets code and web servers, etc..

https://beej.us/guide/bgnet/html/

so, I am a bit confused about how it is that having that pesky "captcha" prevents anything..

I cant imagine that this captcha is really the ultimate solution.

also, considering that I have written custom web server code, I cant imagine how I would go about establishing 10,000 socket calls per second..

and, why does your website serve up those darned captchas to me, even after I have logged in and my ip address is recognizable as being friendly?

man, those captchas gotta go.

[–]magnora7[S] 9 insightful - 1 fun9 insightful - 0 fun10 insightful - 1 fun -  (0 children)

The capchas are only turned on when the server is having trouble staying up, which is pretty rarely. They help because they limit the number of connection attempts one IP can make, and they also limit the number of IPs that can be used to make connection attempts, which are both ways to increase the power of DDOS attacks. They actually help a lot, but we only use them as a last resort because they're annoying.

The captchas are just one layer of protection among many layers.

also, considering that I have written custom web server code, I cant imagine how I would go about establishing 10,000 socket calls per second..

Yeah I agree, they seem to have a botnet at their disposal