Solved

What Is Dos Attack

Posted on 2013-06-07
4
556 Views
Last Modified: 2013-06-20
What Is Dos attack,

Is Dos attack can be made on webservers only or DOS attack can be made on voip(asterisk) server, mail servers etc.
0
Comment
Question by:pawanopensource
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 24

Assisted Solution

by:aadih
aadih earned 125 total points
ID: 39230064
In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users...

https://en.wikipedia.org/wiki/Denial-of-service_attack >

Almost all servers can be subjects to DOS attacks.
0
 
LVL 16

Assisted Solution

by:uescomp
uescomp earned 125 total points
ID: 39230174
Was popular way back to bring down machines using the ping command and loading packs to slow down servers to the point they are unusable, also known as the ping of death.

For instance using this command

ping -l 1024

This will ping with 1024 bytes

This article: http://en.wikipedia.org/wiki/Ping_of_death
0
 
LVL 21

Assisted Solution

by:Rick_O_Shay
Rick_O_Shay earned 125 total points
ID: 39231562
DOS attacks can be made against any network attached device including the networking devices themselves. Some devices and firewalls have built in protections to help by dropping all similar packets received from the same source if they are above a certain threshold of time indicating that they are most likely an attack.
0
 
LVL 57

Accepted Solution

by:
giltjr earned 125 total points
ID: 39232340
As Rick_O_Shay stated, DOS attacks can be made against any networked device, that also includes your desktop, your network enabled cell phone, printers, anything.

If I cause your desktop to crash, then I have denied you a service.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
VPN  services - questions and recommendations 7 56
User Account Question 6 50
Global Cyber attack 5 56
Does Public Key / Private Key encrypt emails too? 7 34
Many old projects have bad code, but the budget doesn't exist to rewrite the codebase. You can update this code to be safer by introducing contemporary input validation, sanitation, and safer database queries.
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question