Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 4 - Damn Dirty DoS Attacks
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING ARTICLES

Damn Dirty DoS Attacks
By: Michael Lowry
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 1
    2008-03-19

    Table of Contents:
  • Damn Dirty DoS Attacks
  • Standard DoS Attacks
  • Dedicated To Your Destruction
  • Is There Any Hope?

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Damn Dirty DoS Attacks - Is There Any Hope?


    (Page 4 of 4 )

    As far as being completely immune from a DoS attack, you're out of luck. This are no full-proof ways to prevent an attack. However, there are ways to make your computer a less attractive prospect for an attacker and they are pretty simple and straightforward.

    • Anti-virus software this examines the data packets as they enter your system and mark them either regular, priority, or dangerous.

    • Firewall this should be configured to restrict the traffic entering and leaving your computer. Most firewalls can only prevent simple DoS attacks, but they are still a good thing to have, and the more modern firewalls are becoming more and more sophisticated.

    • Email be careful where and whom you give your email address to. There are also filters that can be applied to help prevent unwanted traffic.

    There are certain things to look out for if you think you are under attack. Most of this has to do with things being out of the ordinary, something other than technical problems or system maintenance. Be aware of slow system performance, such as when you are trying to open a file or a website (or if the website is completely unavailable). If you're experiencing a sudden increase in spam, then you may want to be on the lookout.

    Pretty much the only thing you can do if you determine that you are being attacked is contact the appropriate technical professionals (e.g. network administrator or ISP) depending on whether it's your computer at work or home. That's all I have for you up to this point. I know, that sucks almost as much as a DoS attack. Sorry!


    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

    WEB HOSTING ARTICLES ARTICLES

    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap