Facebook killed the radio star. And by radio star, I mean the premise of distributed forums around the internet. And that got got by Instagram/SnapChat. And that got got by TikTok. Where the fuck is the internet we once knew?
0 Members and 1 Guest are viewing this topic.
[17:32:45] * xar sets mode: -oooooooooo algorithm ban chris cipher newby stdio TehUser tnarongi|away vursed warz[17:32:54] * xar sets mode: +o newby[17:32:58] <xar> new rule[17:33:02] <xar> me and newby rule all
Quote from: CrAz3D on June 30, 2008, 10:38:22 amI'd bet that you're currently bloated like a water ballon on a hot summer's day.That analogy doesn't even make sense. Why would a water balloon be especially bloated on a hot summer's day? For your sake, I hope there wasn't too much logic testing on your LSAT.
I'd bet that you're currently bloated like a water ballon on a hot summer's day.
He isn't posing a threat right now. He apparently tried to crack my and a few other admins passwords last night, failed, and moved on to another dota site (which he did crack actually).Is there a list of publicly known proxies that I can ban? I'd rather people didn't use proxies at all for this forum (its important on this particular forum to avoid duplicate accounts, etc).
He isn't posing a threat right now. He apparently tried to crack my and a few other admins passwords last night, failed, and moved on to another dota site (which he did crack actually).
Why would he have bots? Anyways, the only thing you can do is require admin approval for new members, and to require an account to view anything. But that's not practical on most boards, so just back up your DB every night (to either a write-once media or to a remote server) or deal with it.
#!/bin/shDATESTAMP=`date +%m-%d-%Y-%H%M`cd /home/check6ga/public_html/chavo/backuprm *.gzmysqldump --opt -p******** -u******** check6ga_tdtboards | gzip >$DATESTAMP.gzcd /home/check6ga/public_html/chavo/echo $DATESTAMP >> msg.txtcat msg.txt | /usr/lib/sendmail -t
Jan 25 01:50:41 BOTTLE sshd[58117]: Invalid user staff from 211.239.154.81Jan 25 01:50:44 BOTTLE sshd[58119]: Invalid user sales from 211.239.154.81Jan 25 01:50:46 BOTTLE sshd[58121]: Invalid user recruit from 211.239.154.81Jan 25 13:09:43 BOTTLE sshd[60605]: Did not receive identification string from 159.226.234.16Jan 25 13:11:04 BOTTLE sshd[60625]: Invalid user webmaster from 159.226.234.16Jan 25 13:11:07 BOTTLE sshd[60627]: Invalid user admin from 159.226.234.16Jan 25 17:24:40 BOTTLE sshd[61268]: Did not receive identification string from 219.127.251.175Jan 25 17:26:31 BOTTLE sshd[61275]: Invalid user staff from 219.127.251.175Jan 25 17:26:33 BOTTLE sshd[61277]: Invalid user sales from 219.127.251.175Jan 25 17:26:35 BOTTLE sshd[61279]: Invalid user recruit from 219.127.251.175
In order to defeat ssh bruteforce bots, I made a firewall rule that blocks for an hour anyone who connects more than 3 times within 30 seconds.
... you could automatically block anybody with 3 failed logins to SMF. That'd be a pretty cool rule
Quote from: iago on January 26, 2007, 10:43:20 pm... you could automatically block anybody with 3 failed logins to SMF. That'd be a pretty cool rule What would happen to those that forgot their password and they tried more than three times?
I'd personally do as Joe suggests
You might be right about that, Joe.
Trying to ban anyone using a proxy is impossible, it's the inherent nature of the concept of proxies...
Ok, side effect, who gives a fuck? Stop trolling and learn something about network security.