Flood servers with data packets??

what is "Flood servers with data packets" meaning from the following??


Types of security attacks
–Denial of service attacks
•Use a network of computers to overload servers and cause them to crash or become unavailable to legitimate users
•Flood servers with data packets??
•Alter routing tables which direct data from one computer to another
•Distributed denial of service attack comes from multiple computers
–Viruses
•Computer programs that corrupt or delete files
•Sent as attachments or embedded in other files
–Worm
•Can spread itself over a network, doesn’t need to be sent
she1Asked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

JohnK813Commented:
At a basic level:

Information is sent between computers in "data packets" - groupings of 1's and 0's.  If you purposely send more data packets to a server than it can handle - "flooding" it - the server will for all intents and purposes shut down - denying its services to anyone who tries to use it.
0
JohnK813Commented:
Do you need a more in depth/technical description?
0
she1Author Commented:
like the the client request a link from the server, if the requests are more than the server can handle it, it is flooding right? what is the other types of flooding?
0
ON-DEMAND: 10 Easy Ways to Lose a Password

Learn about the methods that hackers use to lift real, working credentials from even the most security-savvy employees in this on-demand webinar. We cover the importance of multi-factor authentication and how these solutions can better protect your business!

JohnK813Commented:
Other examples of flooding:

From this page http://whatis.techtarget.com/definition/0,289893,sid9_gci213591,00.html take a look at the Teardrop attack, and the Smurf attack (also known as the "Ping of Death" attack)

In what you have above, "flooding" just means "sending more information than the server can handle."  For example, if I was to set up a program to send millions and millions of data packets to EE every second, I would overload (or flood) their servers.  Since their servers are flooded, you wouldn't be able to access EE.  I'm denying you the service of getting to EE, and that's why it's called a Denial of Service attack.

I hope this is what you need.  I will be out of town until Friday, so if this doesn't answer your question, feel free to email one of the PE's or delete this question and open a new one (or just wait for me to get back).
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
she1Author Commented:
1. what do you mean "PE's"?

2. thanks, i am concerning how to "to send millions and millions of data packets to EE every second"?

what email address should i send to creat the flooding of address?

thanks a lot
0
JohnK813Commented:
1. Page Editors - See http://www.experts-exchange.com/help.jsp#hi141  For example, gemarti is one of the Page editors for Windows Security.

2. You don't want "to send millions and millions of data packets to EE every second" - it's illegal.  If you did, you'd be shutting Experts-Exchange down, and no one would have access to it.  (It's also not done by email, but that's besides the point.)
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
OS Security

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.