?
Solved

How to write Denial of Service using Visual Basic.NET or Java codes

Posted on 2006-07-20
9
Medium Priority
?
391 Views
Last Modified: 2010-04-11
Hi,

Can anyone tell me how to write denial of service using Visual Basic.NET or Java codes.
Please provide me with examples.

Thanks.
0
Comment
Question by:fen2009
8 Comments
 
LVL 24

Expert Comment

by:SunBow
ID: 17151191
Buy a book on subject of Java.net in VB
Pick it up
Throw it against wall
Pick it up
Throw it against wall
---repeat all of the above steps but go faster ---
---repeat all of the above steps but go faster ---
---repeat all of the above steps but go faster ---
0
 
LVL 24

Expert Comment

by:SunBow
ID: 17151200
Write "Denial of Service"
Display "Denial of Service"
Write "Denial of Service using Visual Basic.NET or Java codes"
Display "Denial of Service using Visual Basic.NET or Java codes"
0
 
LVL 24

Expert Comment

by:SunBow
ID: 17151210
Just do it like you write "Congestion" and it should work out
0
Improve Your Query Performance Tuning

In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!

 
LVL 8

Expert Comment

by:charan_jeetsingh
ID: 17152803
Hi Fen,

You asking about writing a DoS attack code from a group of people who are working for making secure networks......Forget it!!
0
 
LVL 6

Expert Comment

by:zwseemm
ID: 17153857
Experts-Exchange should deny you service.
0
 
LVL 12

Expert Comment

by:NetAdmin2436
ID: 17154319
.....You gotta be kidding right?
0
 
LVL 5

Accepted Solution

by:
Netminder earned 0 total points
ID: 17155301
Closed, no points refunded.
Netminder
Site Admin
0
 
LVL 7

Expert Comment

by:dann47
ID: 17155316
Denial of service, how to write!!!  Well if you gotta ask...........  In this case, you certainly will never know!!!!

0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Current business processes need to constantly adapt to changing threats. Surely we do not want to be the next victim. We can take an active stance and stay agile. This article shares some tips.
Cloud computing is a model of provisioning IT services. By combining many servers into one large pool and providing virtual machines from that resource pool, it provides IT services that let customers acquire resources at any time and get rid of the…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

584 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question