Solved

Comsumption Attack

Posted on 2011-09-23
3
280 Views
Last Modified: 2012-05-12
Hi

Q: if my site hosted on free web hosting with limited bandwidth 30,000 MB every month? is my site vulnerable to bandwidth consumption attack? if that possible ? how is it happened?

thanks
0
Comment
Question by:ang3lus
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 8

Accepted Solution

by:
pilson66 earned 125 total points
ID: 36586139
For example, I'll write a primitive script that will loop i download the same large file, until all the traffic limit

whie true; do wget -c http://tour_site.com/big.file.avi; done
0
 
LVL 8

Expert Comment

by:pilson66
ID: 36586147
If you run several of these scripts in parallel - the traffic will end several times faster.
0
 

Author Closing Comment

by:ang3lus
ID: 36586356
i got the point

thanks
0

Featured Post

Building an interactive eFuture classroom

Watch and learn how ATEN provided a total control system solution including seamless switching matrix switch, HDBaseT extenders, PDU, lighting control to build an interactive eFuture classroom.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
phpPgAdmin problem 14 228
LINUX CENTOS + APACHE 9 73
Apache LDAP Authentication 20 55
Web site: http forwards to https causing 301 errors - SEO issue? 26 58
Read about achieving the basic levels of HRIS security in the workplace.
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question