Open
Description
This program really works! It is resource intensive to run, however, as the agency of Bouncer/Doorman event handlers is a difficult task for an already overloaded system. This does not render the program ineffective however, but instead of killing the process at the Bouncer level, the Bouncer may possibly serve as a secondary authenticator to further stall or stop malicious high-density requests from inbound attacker.
This would free up and idle more CPU resource workers to handle the authenticated requests, and a subtle improvement to the original iteration.
kohai@zenbeergarden: /#
Metadata
Metadata
Assignees
Labels
No labels