Once a server running Sen's software has worked out where the attack is coming from, it can block traffic from the culpable IP addresses until the threat subsides
No comments:
Post a Comment
All comments are moderated.
Note: Only a member of this blog may post a comment.
No comments:
Post a Comment
All comments are moderated.
Note: Only a member of this blog may post a comment.