Under Zombie Attack
NDER the quiet exterior of schestowitz.com, which continues to serve pages reasonably fast, there are actually many problems. For the past two weeks, zombie attacks have been launched against the site. As more Windows machines get infected around the world, the number of attacks surges, approaching tens of thousands per day at the moment. This is much beyond the scale that I am used to or can afford. This gives us yet another reason to hate that unsecure, ‘hijackable’ O/S that is permitted to attack reliable and resilient Linux servers.
I have tried a variety of method to combat the scary scale of these attacks, which get worse by the hour. If anybody knows some good solutions, please send me your advice as soon as possible, before the server collapses. Here are a few valid tools apart from the ad-hoc methods I have been using thus far:
The only glaring issue with the above are that they require ownership or power over the Web server. I have contacted my hosts last night as we might have to collaborate on this. It is not only my sites that get penalised, but also other eCommerce sites that depend on QoS for their income.
UPDATE (5:30AM): Can Apache be configured to block requests based on referring URL (with regex)? I could exclude .to fairly cleanly. Please reply by E-mail if you can assist.
UPDATE (10:50AM): I have been told about modsecurity.org, but I still need root access to my host’s machines.
UPDATE (11:30AM): I have also been told about Patch-o-Matic netfilter/iptables.
UPDATE (11:40AM): The following Apache rule might work, but it is yet untested:
RewriteEngine On
RewriteCond %{HTTP_REFERER} .to/
RewriteRule .* - [F]
More details in a separate post to be published shortly.






Filed under:
T this moment I am delivering a series of 4 one-to-one demos to prospective Ph.D. students. This occupies my morning and afternoon and I must admit that I quite enjoy it. I still remember the day when it was me whose ‘role’ was a student awaiting interviews and seeing some astounding demos. Once you grow to fit the very same shoes that you admired, it all seems somewhat worthless nonetheless. That, I suppose, is simply the way of life as the nature of progression. Below is a presentation that I primarily use to reflect on work that I do at present. I re-use this internal talk from earlier this year:
OR the sake of some short comical relief, use

INCE I rarely post items about my personal life, I decided to make an exception today. On my very recent vacation, I taught myself a valuable lesson in bowling — a lesson that cost me an entire game that was filled with gutter balls and oddities. It was a game of exploration and experimentation.
EVIATING from the a development branch, thus staying away from the regular updates cycle, is a step which is bound to have its problems, e.g. security and missed out extensions. I am fully aware of these issues and I made mistakes in the past nonetheless, particularly with Web applications. I am rather confident and comfortable with my choices to extend applications, but one must remember the pitfalls, as well as the very few advantages.
HAT we truly need is not
ROWING criticism becomes apparent as personal information on the Internet breaks new boundaries. This recently had CNET ignored by Google. CNET correspondent bluntly