Tag: attacks

How to Get Rid of Denial-of-Service Attacks

On August 10th I had the opportunity to talk about (Distributed)
Denial of Service (DDoS) at the Megabit 2002 event. I wanted to
show a new way to use standard routers and protocols to combat denial
of service. Unfortunately there wasn’t enough time to really prepare
the test setup. I was unable to show conclusively that it works. I was
able to explain how it is supposed to work. I’m going to repeat that
part here and then talk about the Cisco router configurations that
make it all happen.

Network Denial of Service Attacks. Can you hack it?

These days there are significant increases in network-based attacks and among them is the dreaded Denial-of-Service attack, which can leave your systems either unusable or unreachable. Although these attacks don’t make the news as often as they did when Yahoo.com was taken down by a massive Distributed Denial of Service attack, they are still prevalent.

Introduction To Network Attacks

As a network administrator, it is important that you understand the nature of potential attacks on computer security. We’ll briefly describe the most important types of attacks so that you can better understand precisely what the Linux IP firewall will protect you against. You should do some additional reading to ensure that you are able to protect your network against other types of attacks. Here are some of the more important methods of attack and ways of protecting yourself against them: Unauthorized access

Back To Top