Skip to content

Instantly share code, notes, and snippets.

View jfryman's full-sized avatar

James Fryman jfryman

View GitHub Profile
@jfryman
jfryman / gist:9216611
Created February 25, 2014 20:03
Example of nginx config for Pete Dunlap
upstream grocerylist {
server localhost:3000;
}
upstream groceryblog {
server localhost:3001;
}
upstream dunlapisawesome {
server stevie.petedunlap.com:2020;
[root@localhost study1]# GIT_CURL_VERBOSE=1 GIT_TRACE=2 git push -u origin maste r
trace: built-in: git 'push' '-u' 'origin' 'master'
trace: run_command: 'git-remote-https' 'origin' 'https://github.com/rkhshan/git- course.git'
* Couldn't find host github.com in the .netrc file; using defaults
* 0xa0cb7e0 is at send pipe head!
* About to connect() to github.com port 443 (#0)
* Trying 192.30.252.131... * Connected to github.com (192.30.252.131) port 443 (#0)
* Initializing NSS with certpath: sql:/etc/pki/nssdb
* NSS error -5978
* Closing connection #0
@jfryman
jfryman / Links.md
Last active August 29, 2015 14:01
Links for OpenSourceDays
~ $ traceroute github.com
traceroute to github.com (192.30.252.131), 64 hops max, 52 byte packets
1 192.168.1.1 (192.168.1.1) 1.066 ms 0.791 ms 0.728 ms
2 10.0.21.161 (10.0.21.161) 4.803 ms 2.597 ms 2.077 ms
3 1-11.410.core.sfo.web-pass.com (199.21.86.78) 4.042 ms
10.0.7.236 (10.0.7.236) 3.774 ms
1-11.410.core.sfo.web-pass.com (199.21.86.78) 6.095 ms
4 173.247.205.38 (173.247.205.38) 6.318 ms * *
5 * * 173.247.205.38 (173.247.205.38) 6.172 ms
6 * * *
/* Basic Digital Read
* ------------------
*
* turns on and off a light emitting diode(LED) connected to digital
* pin 13, when pressing a pushbutton attached to pin 10. It illustrates the
* concept of Active-Low, which consists in connecting buttons using a
* 1K to 10K pull-up resistor.
*
*/
@jfryman
jfryman / Vagrantfile
Created September 25, 2014 00:34
Using nginx module with Vagrant
# -*- mode: ruby -*-
# vi: set ft=ruby :
# Vagrantfile API/syntax version. Don't touch unless you know what you're doing!
VAGRANTFILE_API_VERSION = "2"
Vagrant.configure(VAGRANTFILE_API_VERSION) do |config|
config.vm.box = "ubuntu-14.04-amd64"
config.vm.provision "shell", inline: "sudo apt-get -y install ruby"

One thing I wanted to ask, given your exprience in DDoS attacks. We are putting in place a DDoS mitigation strategy and finding a wide variability in pricing from different vendors.

Near as I can tell, the difference between the low end like CloudFlare's $200/mth plan and the $5K-$10K/mth vendors like Prolexic is the support offered for a layer 7 attack. Is that a reasonable summary?

It seems like all vendors offer a reasonable level of layer 3-4 filtering but that if there's a layer 7 attack the high end vendors have the sophisticated tools and methodology to help the customer figure out how to mitigate the attack.

If this perspective is reasonable, how susceptible you think a product like XXX is to a layer 7 attack? I'd hate to buy insurance we don't really need.

The difference is a lot in integration. CloudFlare is only really a CDN at the heart of it, so what you're paying for is that with some DDoS stuff built in. If an attacker gets wind of this, and finds out your origin and decides to

" Setting up Vundle
let vundleUpdate=0
" Check to see if Vundle is even installed...
let vundleReadme=expand('~/.vim/bundle/vundle/README.md')
if !filereadable(vundleReadme)
echo "Installing Vundle.."
echo ""
silent !mkdir -p ~/.vim/bundle
silent !git clone https://github.com/gmarik/vundle ~/.vim/bundle/vundle
---
runner_type: run-remote
enabled: true
entry_point: ''
name: create_deb_from_empty
description: Create a deb package from empty with fpm
parameters:
n:
type: string
description: 'Package Name (e.g.: libpq)'