Platform to share ur knowledge
HomeHome  PortalPortal  CalendarCalendar  GalleryGallery  FAQFAQ  SearchSearch  MemberlistMemberlist  UsergroupsUsergroups  RegisterRegister  Log inLog in  

Display results as :
Rechercher Advanced Search
Latest topics
» Help for PPT
Wed Jul 31, 2013 12:58 pm by webmaster

» Formating PC
Wed Jul 31, 2013 12:50 pm by webmaster

» AutoDesk 3D Studio MAX
Mon Jul 22, 2013 1:58 pm by webmaster

» General computer related errors
Mon Jul 22, 2013 1:54 pm by webmaster

» ------------------------------->CHIPSET<--------------------------------
Fri Jul 19, 2013 5:14 pm by webmaster

» Motherboard and its components
Fri Jul 19, 2013 5:05 pm by webmaster

» Creating 3D Window Effect
Wed Jul 17, 2013 3:35 pm by webmaster

Wed Jul 17, 2013 3:27 pm by webmaster

» Create A Hidden User Account
Mon Jul 15, 2013 6:16 pm by webmaster


Share | 

 DDOS Attack

Go down 

Posts : 253
Points : 759
Join date : 2012-07-22
Age : 28
Location : VELLORE

PostSubject: DDOS Attack   Mon Aug 13, 2012 1:43 pm

DDOS Attack:

A denial-of-service attack (DoS attack) or distributed
denial-of-service attack (DDoS attack) is an attempt to make a computer
or network resource unavailable to its intended users. Although the
means to carry out, motives for, and targets of a DoS attack may vary,
it generally consists of the concerted efforts of a person, or multiple
people to prevent an Internet site or service from functioning
efficiently or at all, temporarily or indefinitely.

Perpetrators of DoS attacks typically target sites or services hosted on
high-profile web servers such as banks, credit card payment gateways,
and even root nameservers. The term is generally used relating to
computer networks, but is not limited to this field; for example, it is
also used in reference to CPU resource management.[1]

One common method of attack involves saturating the target machine with
external communications requests, such that it cannot respond to
legitimate traffic, or responds so slowly as to be rendered effectively
unavailable. Such attacks usually lead to a server overload. In general
terms, DoS attacks are implemented by either forcing the targeted
computer(s) to reset, or consuming its resources so that it can no
longer provide its intended service or obstructing the communication
media between the intended users and the victim so that they can no
longer communicate adequately.

Denial-of-service attacks are
considered violations of the IAB's Internet proper use policy, and also
violate the acceptable use policies of virtually all Internet service
providers. They also commonly constitute violations of the laws of
individual nations.

When the DoS Attacker sends many packets of
information and requests to a single network adapter, each computer in
the network would experience effects from the DoS attack.

Here is download link: [You must be registered and logged in to see this link.]

Your IP may register.So Beware of it.Use IP sniffing Tool for it...
Back to top Go down
View user profile
DDOS Attack
Back to top 
Page 1 of 1
 Similar topics
» Thorium Wars: Attack of the Skyfighter review (3DS eShop)
» Lexapro, Xanax and Anxiety attacks
» Good articles on migraine's relationship with stroke/heart attack/exercise
» character battle

Permissions in this forum:You cannot reply to topics in this forum
Computer and Technology :: Computers and Devices-
Jump to: