So if I'm an attacker, I just forge lots of different requests from different source IP addresses (on a network I can still view). The server may "block" some, but that won't block ME.
Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds