Tag Archives: protection

How can ISP’s help with DDoS mitigation ?



We have seen it time and time again DDoS attacks against organizations causing network interruptions and downtime .

These Organizations at times are hopeless at the hands of the attackers sometimes even for ransom. Think of a small or medium business with a 50Mbps internet connection that is getting attacked what options does that organization have ?


Sure if they pay extra for a subnet with BGP peering and have the technical know how to can black hole the traffic. But this is costly and often times the  smaller business don’t have the technical staff to have at security team keeping watch  .

The other option is to increase bandwidth when the attack happens but how reasonable is that ?  what is the guarantee that the attack won’t grow larger attacks are reaching the Gbps an SMB simply can’t afford that costs.


The best option is getting a DDoS protection service offered via the ISP or Interconnect  anti-DDoS  services are normally offered at the ISP level or carrier level also there are CDN’s (Content Delivery Networks).

Part of the reason why you would want to go with an ISP or a Carrier for DDoS protection is they have much more network infrastructure than you have.  They have all the expertise at the ready and often for much less that it would cost for you to run a solution yourself.


Anti DDoS solutions range from free to several thousands of dollars depending on the protection level but remember you get what you pay for.

The Anti DDoS providers usually offer tiers or actions they offer such as Null route the traffic where the traffic for the IP address that is under attack is re-directed into the carriers core.

The issue with the above solution is that a null route will take down all of the traffic destined to that IP address. So if you are hosting a website or an email server  then you have completed te job for the attacker… and don’t even think about changing the DNS entries the attacks can target the domain;s .

The other option is traffic scrubbing this technique is optimal its is more costly but optimal with this technique the ISP will drop  the bad traffic using algorithms  that detect bad traffic such as SYN floods or UDP flood .

the CDN approach like that used at  https://www.cloudflare.com/   this service  acts a buffer between your web server and the internet all web requests are filtered through the CDN and then scrubbed and delivered to the server . this has some limitation if the server its self is being attacked via the IP address then the CDN will not help.

At the end of it all DDoS attacks cost money sometimes a lot of money, especially for e-commerce websites. Imagine not being able to sell your product’s on your websites due to a DDoS.

the  protection is a lot  cheaper than the cost of a successful attack  business need to adopt service to protect themselves from these ever growing powerful attacks .

Encrypting your data with Truecrypt

Hello All,

In this post I will show you how you can protect yourself against data theft using free open source software

You have heard it on the news someone working for some company was taking an usbstick/portable hard drive from one place to another and lost it and now there are thousands of people’s personal data going around and on some cases not even encrypted! So anyone can simply take that usb stick plug it into a computer and now have all those people’s personal data!

As a company what a pr disaster
As a customer your thinking how did this happen? Is my data safe?

the above scenario isn’t just for business think of how many regular people have personal information on these devices that are lost on a daily basis think of it your personal information,pictures,tax returns,emails,documents,resume

These are not out of the ordinary to find on an usb stick
a piece of data as simple as a resume carries a significant amount of information about you that you may not want a stranger knowing such as your email address/phone number /address etc.

So let’s dig in

First what is encryption?

The best way to put encryption into general terms is you have a secret message for example
Hello everybody
Now you don’t want anyone but the person you or someone you want to see your message
So you create a special code to make the text look like gibberish
For example @^&@^#**#*( *#&(*#& << this would be an example of an encrypted message Now with every encryption you need two sets of encryption keys your public key which everyone can see And you’re private key this key only you know the public key is your garbled text and your private key Makes sense of that garbled text to generate an encryption key you need a cipher a cipher depending on the strength can make a longer stronger this is done by the creating the key using the random number generator to generate the keys the whole point about the length of the key is to make a brute force attack against the encryption key not feasible depending on the size and complexity of the key it can takes decades before you would come close to breaking the encryption Now there are also 2 types of encryption the one above I have explained is call public key encryption where you need 2 sets of keys to decrypt the information or this is also known as asymmetrical encryption The other type is symmetrical where two people or computers have the same key on either end to decrypt the information For more information and a complete rundown on how encryption works True crypts documentation has A lot of technical information on how this all works if interested I highly suggest reading it Now let’s install and use this awesome software The software we are going to use to encrypt our flash drives/portable hard drive is called True Crypt available @ http://www.truecrypt.org

I personally use this software and its great not only is it free and open source which I am all for
It supports many industry standard encryptions and is super easy to use which is always nice
The software also gives you an option to encrypt your system drive but for that I would follow the
Manual available on the site

To use the software first we download the software
Now install the software the process in windows is basically next
for Ubuntu/debian sudo apt-get update && sudo apt-get install truecrypt

Once the software is installed you will get to the main screen see below


Now from this screen you will choose the option “Create volume”


Select “Encrypt a non-system partition/drive”

Now choose your flash drive click next

You will now be able to choose the encryption type you want

I recommend SHA-512 algorithm with AES-twofish


Now click next

You will now create your passphrase

please remember your encryption is only as powerful as your password if you use a simple dictionary based password your encryption is useless as someone will be able to guess your passphrase and unencrypt your data I suggest 10 character password with uppercase and lowercase letters and numbers and a special character this type of password would take years to crack with a password brute force attack

You will now format your drive I recommend the slow way (Not the quick format) as a next layer of protection as your drive is now filled with zeros even though its slower quick works well too it depends on how paranoid you are

And voila you have a fully encrypted flash disk now remember you will need the truecrypt portable version with you possibly on another stick or you can get creative and make a second partition on your stick with only the executable on it to mount the drive

And now with all that you now can carry your flash drives and harddrives with confidence that if lost or stolen your information is safe

if you have any questions/comments/suggestions please let me know

Till Next time stay secure !!!!