Computer and Technology
Would you like to react to this message? Create an account in a few clicks or log in to continue.


Platform to share ur knowledge
 
HomeHome  PortalPortal  GalleryGallery  SearchSearch  Latest imagesLatest images  RegisterRegister  Log inLog in  
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» Help for PPT
DDOS Attack EmptyWed Jul 31, 2013 12:58 pm by webmaster

» Formating PC
DDOS Attack EmptyWed Jul 31, 2013 12:50 pm by webmaster

» AutoDesk 3D Studio MAX
DDOS Attack EmptyMon Jul 22, 2013 1:58 pm by webmaster

» General computer related errors
DDOS Attack EmptyMon Jul 22, 2013 1:54 pm by webmaster

» ------------------------------->CHIPSET<--------------------------------
DDOS Attack EmptyFri Jul 19, 2013 5:14 pm by webmaster

» Motherboard and its components
DDOS Attack EmptyFri Jul 19, 2013 5:05 pm by webmaster

» Creating 3D Window Effect
DDOS Attack EmptyWed Jul 17, 2013 3:35 pm by webmaster

» BRIDGE INTRO
DDOS Attack EmptyWed Jul 17, 2013 3:27 pm by webmaster

» Create A Hidden User Account
DDOS Attack EmptyMon Jul 15, 2013 6:16 pm by webmaster

VISITORS
DDOS Attack Flags_1

 

 DDOS Attack

Go down 
AuthorMessage
shanrajesh
Appatakar
Appatakar
shanrajesh


Posts : 253
Points : 759
Join date : 2012-07-22
Age : 33
Location : VELLORE

DDOS Attack Empty
PostSubject: DDOS Attack   DDOS Attack EmptyMon Aug 13, 2012 1:43 pm

DDOS Attack:

A denial-of-service attack (DoS attack) or distributed
denial-of-service attack (DDoS attack) is an attempt to make a computer
or network resource unavailable to its intended users. Although the
means to carry out, motives for, and targets of a DoS attack may vary,
it generally consists of the concerted efforts of a person, or multiple
people to prevent an Internet site or service from functioning
efficiently or at all, temporarily or indefinitely.


Perpetrators of DoS attacks typically target sites or services hosted on
high-profile web servers such as banks, credit card payment gateways,
and even root nameservers. The term is generally used relating to
computer networks, but is not limited to this field; for example, it is
also used in reference to CPU resource management.[1]



One common method of attack involves saturating the target machine with
external communications requests, such that it cannot respond to
legitimate traffic, or responds so slowly as to be rendered effectively
unavailable. Such attacks usually lead to a server overload. In general
terms, DoS attacks are implemented by either forcing the targeted
computer(s) to reset, or consuming its resources so that it can no
longer provide its intended service or obstructing the communication
media between the intended users and the victim so that they can no
longer communicate adequately.

Denial-of-service attacks are
considered violations of the IAB's Internet proper use policy, and also
violate the acceptable use policies of virtually all Internet service
providers. They also commonly constitute violations of the laws of
individual nations.

When the DoS Attacker sends many packets of
information and requests to a single network adapter, each computer in
the network would experience effects from the DoS attack.

Here is download link: [You must be registered and logged in to see this link.]

Your IP may register.So Beware of it.Use IP sniffing Tool for it...
Back to top Go down
https://computermaniac.forumotion.com
 
DDOS Attack
Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
Computer and Technology :: Computers and Devices-
Jump to: