
Widdle wrote:What do you guys think??
Dazzle wrote:You are able to see the denial of service attacks occuring quite easily with peer guardian.
My annoyance is this, even if we block all the anti p2p servers, if they can bring enough to bear down on you, you will suffer from socket overload and still be knocked off the network.
What "denial of service attacks" though? You mean the media company's companies trying to connect into your primary WinMX client? Or do you mean the flood of incoming search results seen all-too-often as a result of legitimate network primaries flooding connections due to the effectivness of the media company's companies systems at hooking themselves onto unsuspecting primaries?
Widdle wrote:When a primary is connected, it can only handle service to a few secondaries (12 at default).
Widdle wrote:If the media companies use servers to connect to hundreds of Primaries all of the time, it makes acquiring a secondary connection very difficult for other users, as well as allowing them to flood search results.
Widdle wrote:I have seen, using an IP blocker, a ton of attacks on the open ports that WinMX uses for connecting Secondaries.
Widdle wrote:For the first time since I can remember, my Primary is not loaded with twelve secondaries immediatly after connecting. Now I frequently have excess capacity.
Widdle wrote:Sumfuka,
You obviously have more knowledge than I when it comes to this issue, thanks for the technical input.
Widdle wrote:I just started this thread because I know that alot of Primary users on the WinMX network have no idea that the crap searches coming in are coming from their connection and others like it. Alot of users have no knowledge of how the network works at all, and they are getting slammed by the media companies connection attempts.
Widdle wrote:Since you have more technical ability than I, would you mind letting me know if there are other strategies that could be employed to help deal with this problem?
-my filenamehere
Widdle wrote:Also, is it possible to write software that can detect these types of fake files automatically? If so, can it also get the IP of the sharer and log it so it can be uploaded to block lists? I was thinking that if several primaries ran this software with their extra BW perhaps we could coordinate block lists.
Widdle wrote:Thanks for the help.
Users browsing this forum: No registered users and 2 guests