<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ModulesGarden Blog &#187; DDoS</title>
	<atom:link href="https://www.blog.modulesgarden.com/tag/ddos/feed" rel="self" type="application/rss+xml" />
	<link>https://www.blog.modulesgarden.com</link>
	<description>Where Creativity Meets Technology</description>
	<lastBuildDate>Thu, 16 Apr 2026 11:45:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>Practical Tips To Defend Against DDoS Attacks</title>
		<link>https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks</link>
		<comments>https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks#comments</comments>
		<pubDate>Wed, 29 Apr 2015 14:03:27 +0000</pubDate>
		<dc:creator>Joanna Byjoś</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[scanner]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tutorial]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=1834</guid>
		<description><![CDATA[Imagine your average day at work. Managing orders, monitoring transactions, providing services, just as usual&#8230; but then, out of nowhere, your website has just disappeared and all orders and services have gone down. If something like this happens to you, &#8230; <a href="https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">Imagine your average day at work. Managing orders, monitoring transactions, providing services, just as usual&#8230; but then, out of nowhere, your website has just disappeared and all orders and services have gone down. If something like this happens to you, then there is a strong possibility that you have become yet another victim of  Distributed Denial of Service (DDoS) attack.<strong><span id="more-1834"></span></strong></p>
<p style="text-align: justify;">DDoS attacks have become one of the most common disastrous attacks on the Internet. The number of attacks along with their size and intensity has increased substantially: in the space of just last year 57% rise in total DDoS attacks have been reported. That is why we want to share with you some of practical tips to defend against DDoS attacks and actions worth taking while experiencing the attack to minimize losses:</p>
<p style="text-align: justify;"><strong>1.</strong> One of the well-known approaches to handling DDoS attacks is over-provisioning. In order to scotch the attack and reduce its impact on your clients you need to provision for far more traffic than you usually expect to receive. How much should be enough? Estimate the largest amount of traffic that you have ever had, multiply it by ten and adapt your hardware infrastructure to cope with this level of traffic. It will make much more difficult for an attacker to generate enough traffic to bring down your company&#8217;s network.</p>
<p style="text-align: center;"><img class="size-full wp-image-1835 aligncenter" src="https://www.blog.modulesgarden.com/wp-content/uploads/2015/03/DDoS-Attacks-In-Q4-2014-Per-Country.png" alt="DDoS Attacks In Q4 2014 Per Country" width="534" height="480" /></p>
<p style="text-align: justify;"><strong>2.</strong> If you are experiencing DDoS attack you need to consider disconnect<span style="font-size: medium;">ing</span><span style="font-size: medium;"> from a network. It will result in </span><span style="font-size: medium;">taking your business off-line and </span><span style="font-size: medium;">cutting off access to all your products and services but at the same time it will prevent from further utilizing network resources.</span></p>
<p style="text-align: justify;"><strong>3.</strong> Additionally, you can perform DNS redirection by changing an &#8220;A&#8221; record which provides servers with the IP address of your domain. Keep in mind that you have to notify your clients about it so they can enter new IP address in order to keep using services of current network provider. This method is as effective as quickly DNS propagation is proceeded. It may take even a few hours and often requires a direct contact with a hosting service provider.</p>
<p style="text-align: justify;"><strong>4.</strong> IP addresses are cached by servers around the world for a specific period of time (measured in seconds) which is known as &#8220;Time to live&#8221; (TTL). Usually, default TTL value is 86400 seconds (24 hours), which may be far too long if you are under DDoS attack. You can reduce losses by controlling TTL value: the shorter TTL value, the quicker you will be able to redirect all web site requests to a new IP address. You need to, however, bear in mind that shorter TTL value means more frequent requests which, in turn, increases the load on your DNS host.</p>
<p style="text-align: justify;"><strong>5.</strong> Changing DNS or even migrating to another server may be not sufficient to completely resolve the problem. If an attacker finds out what your intentions are, the attack will be redirected to a new target and everything may start all over again. Therefore, it is also worth giving some thought to cloud-based traffic scrubbing services which are able to quickly filter out malicious software from data stream. Data cleansing service providers are the first line of defence against high-volume DDoS attacks &#8211; they have sufficient bandwidth and proper tools to filter network traffic which stems DDoS packets within the cloud and pass normal traffic to the company network.</p>
<p style="text-align: center;"><img class=" wp-image-1836 aligncenter" title="DDoS Attacks In Q4 2014 Per Industry" src="https://www.blog.modulesgarden.com/wp-content/uploads/2015/03/DDoS-Attacks-In-Q4-2014-Per-Industry.png" alt="" width="533" height="532" /></p>
<p style="text-align: justify;"><strong>6.</strong> You may also take into consideration some additional services, such as CloudFlare. They monitor network traffic and collect data that are used as a basis to assess the risk of possible attacks. Thanks to this, each attack attempt is thwarted before it does any damage. What is more, in case of a serious attack, they are able to restore a webpage and revert back any negative changes using previously made backup files. This way, users may not even notice the malfunction.</p>
<p style="text-align: justify;">Destructive power of DDoS attacks cannot be disregarded. <span style="font-size: medium;">Every company needs to ensure its</span> sustained operation <span style="font-size: medium;">and resource availability by remaining vigilant and taking all possible measures </span><span style="font-size: medium;">to mitigate the risk of </span><span style="font-size: medium;">being hit before it happens.</span></p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/practical-tips-to-defend-against-ddos-attacks/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Improvements Of Security And Stability</title>
		<link>https://www.blog.modulesgarden.com/improvements-of-security-and-stability</link>
		<comments>https://www.blog.modulesgarden.com/improvements-of-security-and-stability#comments</comments>
		<pubDate>Fri, 29 Aug 2014 14:34:56 +0000</pubDate>
		<dc:creator>Piotr Dołęga</dc:creator>
				<category><![CDATA[Main]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">https://www.blog.modulesgarden.com/?p=1406</guid>
		<description><![CDATA[A couple of days ago we dealt with a huge DDoS attack which caused downtime of our website and breakdown of our licensing system. As soon as we to stood on our own feet, we begun working on entirely new &#8230; <a href="https://www.blog.modulesgarden.com/improvements-of-security-and-stability">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
			<content:encoded><![CDATA[<p style="text-align: justify;">A couple of days ago we dealt with a huge DDoS attack which caused downtime of our website and breakdown of our licensing system. As soon as we to stood on our own feet, we begun working on entirely new solution that was supposed to drastically improve the security and stability of our services, especially the modules.<strong><span id="more-1406"></span></strong></p>
<p style="text-align: justify;">And so it happened. Today we finished the first phase of the plan through reorganising our whole server and network structure, and applying security improvements. That will result in minimization the risk of downtimes and interruptions in the delivery of services. But most importantly, we finished the massive update of all the modules to implement a far better license verification mechanisms. In this way, even if the licensing servers are down, the proper work of your modules will not be interrupted.</p>
<p style="text-align: justify;">To benefit from the mentioned improvements you will need to upgrade your modules. To do so, simply log in to our <span style="text-decoration: underline;"><span style="color: #3366ff;"><a title="ModulesGarden Client Area" href="https://www.modulesgarden.com/manage/" target="_blank"><span style="color: #3366ff; text-decoration: underline;">client area</span></a></span></span>, download the latest versions released today (29.08.2014) and follow this simple <span style="text-decoration: underline;"><span style="color: #3366ff;"><a title="How To Update Modules" href="http://www.docs.modulesgarden.com/Modules_Update" target="_blank"><span style="color: #3366ff; text-decoration: underline;">instruction</span></a></span></span>.</p>
<p style="text-align: justify;">Please note, that you do not have to update the modules, but it is highly recommended.  In case you do not update your modules, we can not guarantee you the adequate stability at the time of serious server failures. However, they will work correctly. The decision belongs to you but we are convinced that there is no reason to postpone this task.</p>
<p style="text-align: justify;">Soon, we will implement additional improvements like for example secure message system into our ticket system. It will further enhance the safety of your valuable data provided in the tickets. We will keep you posted.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.blog.modulesgarden.com/improvements-of-security-and-stability/feed</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
