We‘re here totell youeverythingaboutDDoS And Help You to Protect From DDoS Attack !
One comment:
I’ve read your article on OVH firewall implementations, can you explain why your method is opposite to one exposed in this article ( https://kdas.me/ovh-firewall-howto/ ) ? you refuse tcp fragment established, and other one authorise it, why? thanks
I’ve read your article on OVH firewall implementations, can you explain why your method is opposite to one exposed in this article ( https://kdas.me/ovh-firewall-howto/ ) ? you refuse tcp fragment established, and other one authorise it, why? thanks