How to Install and Uninstall slowhttptest.x86_64 Package on AlmaLinux 8
Last updated: November 01,2024
1. Install "slowhttptest.x86_64" package
This guide let you learn how to install slowhttptest.x86_64 on AlmaLinux 8
$
sudo dnf update
Copied
$
sudo dnf install
slowhttptest.x86_64
Copied
2. Uninstall "slowhttptest.x86_64" package
Please follow the guidance below to uninstall slowhttptest.x86_64 on AlmaLinux 8:
$
sudo dnf remove
slowhttptest.x86_64
Copied
$
sudo dnf autoremove
Copied
3. Information about the slowhttptest.x86_64 package on AlmaLinux 8
Last metadata expiration check: 1:05:36 ago on Mon Sep 5 03:22:42 2022.
Available Packages
Name : slowhttptest
Version : 1.8.2
Release : 1.el8
Architecture : x86_64
Size : 49 k
Source : slowhttptest-1.8.2-1.el8.src.rpm
Repository : epel
Summary : An Application Layer DoS attack simulator
URL : https://github.com/shekyan/slowhttptest
License : ASL 2.0
Description : SlowHTTPTest is a highly configurable tool that simulates some Application
: Layer Denial of Service attacks. It implements most common low-bandwidth
: Application Layer DoS attacks, such as slow-loris, Slow HTTP POST, Slow Read
: attack (based on TCP persist timer exploit) by draining concurrent connections
: pool, as well as Apache Range Header attack by causing very significant memory
: and CPU usage on the server.
Available Packages
Name : slowhttptest
Version : 1.8.2
Release : 1.el8
Architecture : x86_64
Size : 49 k
Source : slowhttptest-1.8.2-1.el8.src.rpm
Repository : epel
Summary : An Application Layer DoS attack simulator
URL : https://github.com/shekyan/slowhttptest
License : ASL 2.0
Description : SlowHTTPTest is a highly configurable tool that simulates some Application
: Layer Denial of Service attacks. It implements most common low-bandwidth
: Application Layer DoS attacks, such as slow-loris, Slow HTTP POST, Slow Read
: attack (based on TCP persist timer exploit) by draining concurrent connections
: pool, as well as Apache Range Header attack by causing very significant memory
: and CPU usage on the server.