http://ciisqbg45nggykdl6rjdrq3wc64csga4vkphu66qsi65mypeitqedoad.onion/blog/port-striping-v3
Also, unlike the old setup where Snort only dropped packets that matched a rule, the new setup blocks all traffic from a client for a short time if they trigger any abuse rule. This should help keep abuse complaints (and CAPTCHAs) down. The snort ruleset we use has always been very minimal to reduce false positives, so if some lazy malicious traffic is getting caught by such a simple ruleset, then it usually means that the user is also sending a lot of other malicious...