- Posts: 1
- Thank you received: 0
DOS attack..
18 years 9 months ago #13056
by popcorn
DOS attack.. was created by popcorn
hii...
i wud like to know a little bit about how to attack DOS..
i try to search it, but almost of them just juz give me the coding..
i don't know how to use it..
so, anyone want to help me??
i juz want to know about it, but not to use it in wrong way...
tq
i wud like to know a little bit about how to attack DOS..
i try to search it, but almost of them just juz give me the coding..
i don't know how to use it..
so, anyone want to help me??
i juz want to know about it, but not to use it in wrong way...
tq
18 years 9 months ago #13058
by TheBishop
Hello popcorn
If I understand your question correctly, DOS stands for Denial Of Service and is a generic term for a wide range of different techniques intended to do just that - to remotely stop a machine or network from functioning. These attacks are only ever launched for malicious and illegal purposes and the only legitimate reason for studying them is to learn how they can be mitigated
If I understand your question correctly, DOS stands for Denial Of Service and is a generic term for a wide range of different techniques intended to do just that - to remotely stop a machine or network from functioning. These attacks are only ever launched for malicious and illegal purposes and the only legitimate reason for studying them is to learn how they can be mitigated
18 years 9 months ago #13062
by cisman
Replied by cisman on topic Re: DOS attack..
hi popcorn,
In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, web sites, online accounts (banking, etc.), or other services that rely on the affected computer.
The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. When you type a URL for a particular web site into your browser, you are sending a request to that site's computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can't process your request. This is a "denial of service" because you can't access that site.
An attacker can use spam email messages to launch a similar attack on your email account. Whether you have an email account supplied by your employer or one available through a free service such as Yahoo or Hotmail, you are assigned a specific quota, which limits the amount of data you can have in your account at any given time. By sending many, or large, email messages to the account, an attacker can consume your quota, preventing you from receiving legitimate messages.
In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, web sites, online accounts (banking, etc.), or other services that rely on the affected computer.
The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. When you type a URL for a particular web site into your browser, you are sending a request to that site's computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can't process your request. This is a "denial of service" because you can't access that site.
An attacker can use spam email messages to launch a similar attack on your email account. Whether you have an email account supplied by your employer or one available through a free service such as Yahoo or Hotmail, you are assigned a specific quota, which limits the amount of data you can have in your account at any given time. By sending many, or large, email messages to the account, an attacker can consume your quota, preventing you from receiving legitimate messages.
- Dead-Neur0ns
- Offline
- New Member
Less
More
- Posts: 16
- Thank you received: 0
18 years 9 months ago #13075
by Dead-Neur0ns
<= IИse©u®ity Is A ®esult Of T®ying To Be Se©u®e =>
Replied by Dead-Neur0ns on topic Re: DOS attack..
<= IИse©u®ity Is A ®esult Of T®ying To Be Se©u®e =>
18 years 8 months ago #13422
by Kn1ght
Thanks
Replied by Kn1ght on topic Re: DOS attack..
main type of DOS in the old days was just ping flooding, most DOS attacks can be blocked and stopped now at your router before it gets into your network, even in the DMZ--- I hope this is just for informational purposes.
Thanks
Time to create page: 0.133 seconds