Not yet registered? Create a OverBlog!

Create my blog

What are DDoS attacks?

DDoS attacks tend to pop up a lot in the news as more and more websites become victims of them, but what are they exactly? Read below to find out.

DoS attacks

To understand a DDoS attack, you first need to know what a DoS attack is. DoS stands for ‘denial of service’, and so a DoS attack attempts to bring about denial of service to a website or server by flooding it with traffic. This is achieved in a number of ways, but usually involves taking advantage of exploits which the site or server hasn’t protected itself against.

DDos attacks

A DDoS attack then is a ‘distributed denial of service attack’, this has the same end goal as a DoS attack (to result in a denial of service for the target), but goes about it in a slightly different way. Specifically, a DDoS attack uses multiple computers which are controlled by hackers either directly or through being compromised by Trojans, to target a specific website or server. Essentially, it is a brute force attack which bombards the website with too much traffic for it to cope with. A DDoS attack also tends to have more victims than a DoS attack as many of the systems attacking the target belong to the general public and have simply been infected with a Trojan, thereby harming all of those computers and their users as well as any intended target.

Targeted attacks

Unlike many hacks which simply infiltrate whoever happened to be in the wrong place at the wrong time, or people who don’t have an adequate firewall and anti-virus, DDoS attacks tend to be targeted at a specific company or individual, and as such, there is normally an agenda behind them - political or otherwise. Recently, the collective hacker ‘Anonymous’ and splinter group ‘Lulzsec’ have become infamous for targeted hacks, some of which were DDoS attacks. However, the practice has existed among hackers for many years.

General advice

As an individual, it is unlikely that you will become the victim of a DDoS attack. Other hacks, viruses and Trojans are far more likely to attack your PC. However, it is always advisable to have a strong firewall and anti-virus and to run regular scans. Also, be careful about which sites you visit in order to minimise your chances of falling victim to any kind of cyber attack.

Same category articles Computers

What is a database? (types, uses)

What is a database? (types, uses)

Databases are the key to many aspects of online life, and are generally the most efficient was of storing and manipulating data. most people, however, seem to reach of their favourite spreadsheet application when storing data and in doing so storing date often inefficiently. this article takes a look at what a database is and what types there are.
Review: Dell customer care

Review: dell customer care

Computers have become such an integral part of modern living that it is rare to find a home that isn't fully-equipped with some element of technology. outside of home, leisure, businesses and corporations are dominated by technology and machinery that didn't exist only a few years ago. the problem is that, all computers are prone to failure and that's why technical support exists. this article provides you with a review of dell customer care.
MLM Lead System Pro: Review and rate

Mlm lead system pro: review and rate

Network marketing / multi-level marketing, has both the elements of truth and illusion to it. as a matter of concern, great confusion arises with mlm companies showcasing the examples of luck or chances in order to create the illusion of a simple, easy high profit business that anyone can be part of. actually, they make you believe that you will by no chance fail, but only succeed. the facts on mlm are slightly different.
A guide to email management software

A guide to email management software

Email management helps in ensuring effective email communication. the email tools of this email software help you in scanning messages and tracking email responses of your company. you can quickly solve customer queries through this email management software.