Does anyone actually use this? IS there any reasons NOT to use it? Advantages/Disadvantages of using it? I've never used it myself, but am wondering if it is a decent quick way to mitigate attacking ip's Thanks!