<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>protocol &#8211; lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</title>
	<atom:link href="https://lifelinux.com/tag/protocol/feed/" rel="self" type="application/rss+xml" />
	<link>https://lifelinux.com</link>
	<description>All About Linux !</description>
	<lastBuildDate>Thu, 31 Jan 2013 01:00:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.5.3</generator>
	<item>
		<title>Repel port flood by CSF and IPT_Recent</title>
		<link>https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/</link>
					<comments>https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/#comments</comments>
		
		<dc:creator><![CDATA[Linux Killer]]></dc:creator>
		<pubDate>Thu, 31 Jan 2013 00:58:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[WebServer]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[Flood]]></category>
		<category><![CDATA[flood attack]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[port]]></category>
		<category><![CDATA[protocol]]></category>
		<category><![CDATA[servers]]></category>
		<guid isPermaLink="false">http://www.lifelinux.com/?p=1480</guid>

					<description><![CDATA[<p>Protect the server from Flood attacks , Using the property Port Flood Protection In firewall CSF . After doing the necessary settings will be able to determine the number of allowed connections Same time for each IP tries to connect to the server. So How to Make a flood attack ? Logically flood attacks are two ways : first through a specific [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/">Repel port flood by CSF and IPT_Recent</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p></p><p>Protect the server from Flood attacks , Using the property Port Flood Protection In firewall CSF . After doing the necessary settings will be able to determine the number of allowed connections Same time for each IP tries to connect to the server.</p>
<p><span id="more-1480"></span><br />
<strong>So How to Make a flood attack ?</strong><br />
Logically flood attacks are two ways :<br />
first through a specific communication<br />
the second through multiple connections each connection of these connections connect with the provider<br />
<strong>Requirements</strong></p>
<ol>
<li>Installing firewall CSF last version</li>
<li>Enabled IPT and works well</li>
<li>Model IPT_Recent special for IPT</li>
</ol>
<p><strong>Application</strong></p>
<p>Through edited the configuration file special for CSF it is located in the following path:</p>
<pre>root@server:$ nano /etc/csf/csf.conf</pre>
<p>We pressing CTRL + W and look for PORTFLOOD we will find the line as follows default :</p>
<pre>PORTFLOOD = " "</pre>
<p>put inside ” ” Settings that we want ,as in the following example:</p>
<pre>PORTFLOOD = "80;tcp;20;10"</pre>
<p>80 is the port , TCP is the protocol , 20 is the number of connections allowed at the same time , 10 is time of pause temporarily after the 10 seconds is allowed IP make new contacts</p>
<p><strong>Important note: </strong>ipt_recent can count 20 Packets for each Title , So you can change the number of connections from 1 to 20 only</p>
<p>Is there a possibility of adding more than one port ?yes be as follows (Just an example) :</p>
<pre>PORTFLOOD = "22;tcp;10;200,21;tcp;15;100,80;tcp;20;5"</pre>
<p><strong><span style="color: #000000;">Note</span> </strong>that when we add a new port we put a comma (,)</p>
<p>In the previous example you choose more than one port are 22, 21 and 80 And you can add more and you can change the number of connections and also change the protocol type, for example, from TCP to UDP after the completion of the edited we save the file : CTRL + X, Y, and then Enter button.</p>
<p>Finally, do not forget to restart CSF with the following command:</p>
<pre>root@server:$ csf -r</pre>
<p>Thank You ,,</p>
<g:plusone href="https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/" size="standard"  annotation="none"   ></g:plusone><p>The post <a rel="nofollow" href="https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/">Repel port flood by CSF and IPT_Recent</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lifelinux.com/repel-port-flood-by-csf-and-ipt_recent/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>How To Flush The Entire Contents Of Memcache Server</title>
		<link>https://lifelinux.com/how-to-flush-the-entire-contents-of-memcache-server/</link>
					<comments>https://lifelinux.com/how-to-flush-the-entire-contents-of-memcache-server/#respond</comments>
		
		<dc:creator><![CDATA[lifeLinux]]></dc:creator>
		<pubDate>Sat, 28 Jan 2012 18:05:45 +0000</pubDate>
				<category><![CDATA[Sys Admin]]></category>
		<category><![CDATA[command telnet]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[localhost]]></category>
		<category><![CDATA[memory]]></category>
		<category><![CDATA[nc command]]></category>
		<category><![CDATA[nc command flush memcached]]></category>
		<category><![CDATA[netcat]]></category>
		<category><![CDATA[netcat command]]></category>
		<category><![CDATA[netcat command flush memcached]]></category>
		<category><![CDATA[network connections]]></category>
		<category><![CDATA[protocol]]></category>
		<category><![CDATA[server ip]]></category>
		<category><![CDATA[tcp]]></category>
		<category><![CDATA[telnet command]]></category>
		<category><![CDATA[telnet command flush memcached]]></category>
		<category><![CDATA[UNIX]]></category>
		<category><![CDATA[unix utility]]></category>
		<guid isPermaLink="false">http://www.lifelinux.com/?p=1312</guid>

					<description><![CDATA[<p>If you use Memcached server to store application data, you may want to invalidate it once you deploy a new version to avoid corruption or weird results&#8230; In this article, I&#8217;ll show you How do I flush the entire contents of a Memcached server ? Using telnet command I often use telnet to flush the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://lifelinux.com/how-to-flush-the-entire-contents-of-memcache-server/">How To Flush The Entire Contents Of Memcache Server</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p></p><p>If you use Memcached server to store application data, you may want to invalidate it once you deploy a new version to avoid corruption or weird results&#8230; In this article, I&#8217;ll show you How do I flush the entire contents of a Memcached server ?<br />
<span id="more-1312"></span></p>
<h2>Using telnet command</h2>
<p>I often use telnet to flush the entire contents of Memcached server, type the following command</p>
<pre># telnet localhost 11211</pre>
<p>Output</p>
<pre>Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
<span style="color: #0000ff;">flush_all</span>
OK
<span style="color: #0000ff;">quit</span>
Connection to localhost closed by foreign host.</pre>
<p><strong>Where</strong><br />
&#8211; localhost: Memcached server instance<br />
&#8211; 11211: Memcached server port</p>
<h2>Using netcat command</h2>
<pre># echo "flush_all" | nc localhost 11211</pre>
<p>By default, nc (or netcat) creates a TCP socket either in listening mode (server socket) or a socket that is used in order to connect to a server (client mode). Actually, netcat does not care whether the socket is meant to be a server or a client. All it does is to take the data from stdin and transfer it to the other end across the network.</p>
<h2>Restart Memcached Server</h2>
<p>Login as root and type the following command</p>
<pre># /etc/init.d/memcached restart</pre>
<p>Restarting your application is not ideal however, you will lose anything cached in memory, cause delays to users trying to access your site, that sort of thing.</p>
<h2>Using PHP script</h2>
<p>Create php file with the following content</p>
<pre>
# vi flush_memcached.php
$memcache = new Memcache;
$memcache->connect('localhost', 11211);
$memcache->flush();
</pre>
<p>To execute this script, type the following command </p>
<pre>
# php flush_memcached.php
</pre>
<g:plusone href="https://lifelinux.com/how-to-flush-the-entire-contents-of-memcache-server/" size="standard"  annotation="none"   ></g:plusone><p>The post <a rel="nofollow" href="https://lifelinux.com/how-to-flush-the-entire-contents-of-memcache-server/">How To Flush The Entire Contents Of Memcache Server</a> appeared first on <a rel="nofollow" href="https://lifelinux.com">lifeLinux: Linux Tips, Hacks, Tutorials, Ebooks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lifelinux.com/how-to-flush-the-entire-contents-of-memcache-server/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
