If you want help your router to support 2x DDoS you’re receiving now, disable route cache. You will see your cpu usage immediately goes down.

Put rp_filter in loose mode and enable tcp syncookie.

Set (only if you use router as border one and you not do nat or similar services)
/ip firewall connection tracking set enabled=no

Use only raw rules and setup something like this:

/ip firewall raw
add    chain=prerouting action=jump jump-target=udp-filters in-interface=NETIX log=no log-prefix="" protocol=udp

add    chain=prerouting action=jump jump-target=tcp-filters in-interface=NETIX log=no log-prefix="" protocol=tcp

add   chain=udp-filters action=accept in-interface=NETIX src-port=53 limit=2500,100:packet log=no log-prefix="" protocol=udp

add    chain=udp-filters action=drop in-interface=NETIX src-port=53 log=no log-prefix="" protocol=udp

add  chain=udp-filters action=drop in-interface=NETIX src-port=389 log=no log-prefix="" protocol=udp comment=LDAP

add  chain=udp-filters action=drop in-interface=NETIX src-port=80 log=no log-prefix="" protocol=udp comment="UDP SRC 80"

add  chain=udp-filters action=drop in-interface=NETIX src-port=443 log=no log-prefix="" protocol=udp comment="UDP SRC 443"

add  chain=udp-filters action=drop in-interface=NETIX dst-port=80 log=no log-prefix="" protocol=udp comment="UDP DST 80"

add  chain=udp-filters action=drop in-interface=NETIX dst-port=443 log=no log-prefix="" protocol=udp comment="UDP DST 443"

add    chain=udp-filters action=notrack log=no log-prefix=""

add    chain=tcp-filters action=notrack log=no log-prefix=""

add    chain=prerouting action=notrack log=no log-prefix=""

/ip firewall filter

add chain=forward protocol=tcp tcp-flags=syn,rst action=drop

You will block most know UDP Amplification script.

this is the best configuration we found to allow MT absorb attacks, you can’t get better performance.

Now to do real tcp mitigation you should apply an external device (in line or out of line is your choice) to filter some more specific packets (strings, ttl, flags…). If you not feel safe to use in line, consider to use fastnemon that detect a ddos and inject a route to forward /32 to that device.

Or if you have a budget, choose a company that does ddos mitigation and you will sleep better

umount /mnt
fdisk /dev/vdb
fdisk /dev/vdb
mkfs.ext4 /dev/vdb1
nano /etc/fstab
/dev/vdb1 /home ext4 defaults 0 1
mount -a

askubuntudan copy paste ettim

The commandline version of the libatasmart library used by Gnome Disks is called skdump part of the libatasmart-bin package which is not installed by default. Install by using:

sudo apt-get install libatasmart-bin

Next run the following command to see the SMART information by running the following command in the terminal (replacing /dev/sda by the path to your drive):

sudo skdump /dev/sda

As an alternative the smartctl from the smartmontools package could be used. Install by using:

sudo apt-get install smartmontools

You will then be able to get information on SMART by running the following command in the terminal (replacing /dev/sda by the path to your drive):

sudo smartctl -a /dev/sda

Note that smartctl tends to be overly verbose. Use the -q errorsonly argument to display only errors:

sudo smartctl -q errorsonly -a /dev/sda

du –max-depth=1 | sort -n # Show the size of all the directories in the current directory and sort them by size.

hatta du -h –max-depth=1 | sort -n

[root@isminiyaz log]

# du -h –max-depth=1 | sort -n
2,0M ./directadmin
4,0K ./iptraf
4,0K ./ntpstats
4,0K ./sssd
7,4G .
8,0K ./samba
21M ./sa
30M ./audit
32K ./ConsoleKit
56K ./cups
80K ./prelink
111M ./httpd
554M ./proftpd
698M ./exim

[root@isminiyaz log]


php ile mssql sunucuya baglanalim. Centos 7 uzerinde Directadmin icin yazdim.

1- php 5.6 ile FREETDS kullaniyoruz

freetds yi cek

wget wget ftp://ftp.freetds.org/pub/freetds/stable/freetds-patched.tar.gz

freetds yi uygun sekilde kur:

tar zxvf freetds-patched.tar.gz
cd freetds-1.00.109/
./configure –prefix=/usr/local/freetds
make install

php configure dosyasini duzenle

nano /usr/local/directadmin/custombuild/configure/ap2/configure.php56

    --with-mssql=/usr/local/freetds \


sonrasi bu:

cd /usr/local/directadmin/custombuild
./build php n

2- Php 7.2 icin – Php 7 ile beraber freetds kullanamiyoruz. php destegini kesti.

microsoft kendisi cikardi pdo lib sqlsrv vs vs

php 7.2 icin kurulum su sekildedir. (PECL ile yapicaz)

curl https://packages.microsoft.com/config/rhel/7/prod.repo > /etc/yum.repos.d/mssql-release.repo
yum update
ACCEPT_EULA=Y yum install -y msodbcsql mssql-tools unixODBC-devel
pecl install sqlsrv
pecl install pdo_sqlsrv
nano /usr/local/lib/php.ini




service httpd restart

Gule Gule Kullan…

this is youtube re-embed test


no start stop script needed 😀



Instalation of IBM DB2 module should be very easy (refering to the installation instructions):

  1. First of all, we need to download the driver package from here
  2. unpack the package to the server at /opt/ibm_db2/dsdriver
  3. chmod 755 installDSDriver
  4. ./installDSDriver
  5. Install pecl and php-pear (may need ksh): yum install php-pear
  6. pecl install ibm_db2
  7. When asked, provide the path to the db2 driver (here /opt/ibm_db2/dsdriver)
  8. You may check if it is installed by: pecl list
  9. Last thing: chmod o+w /opt/ibm_db2/dsdriver/cfg
  10. Edit /etc/php.ini and add extension=ibm_db2.so
  11. service httpd restart

Then in PHP:

Whole process with lot of pre-requisites for python is here (it works with little modifications for PHP too).


you can fix that problem with an arping:

[root@hedodhedo ~] # arping -s
ARPING from eth0
Unicast reply from [00:0B:45:80:C0:00] 1.846ms
Unicast reply from [00:0B:45:80:C0:00] 1.483ms
^CSent 2 probes (1 broadcast(s))
Received 2 response(s)
[root@hedodhedo ~]# logout
Connection to closed.

# ping
PING ( 56(84) bytes of data.
64 bytes from icmp_seq=1 ttl=63 time=0.377 ms
64 bytes from icmp_seq=2 ttl=63 time=0.205 ms

— ping statistics —
2 packets transmitted, 2 received, 0% packet loss, time 1000ms
rtt min/avg/max/mdev = 0.205/0.291/0.377/0.086 ms

Kind Regards,