SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Novell (NOVL) dirt cheap, good buy?

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Paul Fiondella who wrote (30262)2/11/2000 3:59:00 PM
From: Richard J. Haynal  Read Replies (2) of 42771
 
Paul

There are basically three ways you can do this. A session can be hi-jacked, a host or server can be compromised, or one can merely craft a packet with source address of network-to-be attacked.

The thing about a Denial of Service attack is that it can go after a legitamate service offered at the site and just overwelm it. (i.e. There are applications out on all of the hacker sites which will fire off a continuous stream of packets. This may be in the form of requesting web page (www.novell.com). This is a legitamate request and one does not have to authenicate to anyone to get it. These request can be sent pretty fast. The whole idea is to over burden the site's server/firewall, effectively killing their pipe, server, and firewall. The way to defend against this is to just tell the firewall if you see "X requests within X timeframe" from any one box, block that box.

The big attacks this last week have been a new type called "Distributed Denial of Services" attack. All it means is that the souce address now is being changed. So this attack looks like it is coming from many boxes instead of one. The old defense for "Denial of Services" attacks will not catch this.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext