26 Jul 14, 02:43PM
A demo with screenshot showing the player in the same game (scoreboard to compare?) seems good enough without having anyone to look at the logs.
I'm not lazy -- checked the logs plenty before -- I just don't have as much time as I did, and I don't see why I should shut everything down rather than find ways to let it run itself.
Maybe DrauL can weigh in as I haven't worked at an ISP in a while and I don't have access to the resources anymore, but I would imagine ISPs have DDoS mitigation far upstream, and probably something more sophisticated than just blackholing your block.
As far as the PC itself, unsolicited inbound connections should not be allowed through most ISP gateways where the firewall hasn't been tampered with -- attacks in this area mostly involve the user first accessing something malicious. Of course, it isn't always like this, but in most cases it's a non-issue.
Anyway, I appreciate all the input; I'll think about it and see if there might be any better ways.
I'm not lazy -- checked the logs plenty before -- I just don't have as much time as I did, and I don't see why I should shut everything down rather than find ways to let it run itself.
Maybe DrauL can weigh in as I haven't worked at an ISP in a while and I don't have access to the resources anymore, but I would imagine ISPs have DDoS mitigation far upstream, and probably something more sophisticated than just blackholing your block.
As far as the PC itself, unsolicited inbound connections should not be allowed through most ISP gateways where the firewall hasn't been tampered with -- attacks in this area mostly involve the user first accessing something malicious. Of course, it isn't always like this, but in most cases it's a non-issue.
Anyway, I appreciate all the input; I'll think about it and see if there might be any better ways.