Overloading a target server or application with traffic that normal traffic can't access the server. The traffic generated is from botnets - compromised computers on the internet
Have a question wasn’t explained in video hackers are usually people wanting to steal money or benifit How would this be beneficial to them like why would they waste there time to mess up your internet connection they can’t get any of your info passwords extracted or view files on the devices ? “Oh you connect to your Wi-Fi “”
I have two questions: 1) If a hacker has the private IP address of the target, they can only launch a dos or ddos attack if they are connected to the target's internal network right? 2) if the hacker has the public IP address of the target they can launch a dos or ddos attack even if not connected to the internal network correct?
Ans 1. Yes it is easy for them as someone is already infiltrate your network... Ans 2.. Maybe if your IP is static Basically in IPV4 you need to connect to internet each time to be get public IP translated by NAT...but if is static then it is already hunting you down...
2 Questions: 1. How I find out if my PC is infected and what can I do to erase the malware from my computer ? 2. That explains why my computer operates at a slower speed compared to my original experience with it ?
Hi all, We have a Java(Websphere) application, when we use Qualys scanning, it says our application has "Dos(Slowloris) 150079 Slow HTTP headers vulnerability", anybody kind-hearted could help me to fix it?
So current 2021 apex legends community believes everyday console uses are capable of doing this and ruining their gaming experience... what I dont understand is why consoles are they're scapegoat. It's not like pcs are an advance 10x better in all ways than some old gen console
hi sir thank you so much for the explanation! I want to ask you, that i'm working on a quiz and it's asking me what is the type of an attack that would prevent a server from responding to requests , should i I use Syn floading or DDOS attack ? what do you think
what abt someone just using a bunch of threads on a set of computers they own sending a whole bunch of api requests? by using jmeter ir something. they wouldnt even need to hack other computers right?