Discover Habbo's history
Treat yourself with a Secret Santa gift.... of a random Wiki page for you to start exploring Habbo's history!
Happy holidays!
Celebrate with us at Habbox on the hotel, on our Forum and right here!
Join Habbox!
One of us! One of us! Click here to see the roles you could take as part of the Habbox community!


Results 1 to 6 of 6
  1. #1
    Join Date
    Jun 2008
    Posts
    3,788
    Tokens
    957

    Latest Awards:

    Default HELP WITH I.T +REP

    Okay so I have to finish two whole I.T units, I don't really have a deadline but my teacher said it would be best for me to do them over the summer and then bring them in, in September. However, I will be going away for the whole of the summer and don't want to be doing any I.T work, so I am trying to get as much of it done as possible at the moment.

    I could also do it after September, but I will be in Year 11 and I will be having other priorities and other things to do at that time and I don't really need I.T falling down on me aswell.

    So basically, all day I have been doing this unit which I have nearly finished and I am literally brain dead and cannot think straight, my heads gone all fuzzy and I'm having trouble googling stuff!

    This is my question:

    What is a denial of service attack and how does it affect businesses and other organisations?

    What technical knowledge would an attacker have to have for the attack to be carried out?
    If anyone answer this for me, I will rep you and love you forever!


  2. #2
    Join Date
    Apr 2009
    Location
    Brentwood, Essex.
    Posts
    586
    Tokens
    236

    Default

    You may have better luck in the Web section.

  3. #3
    Join Date
    Feb 2009
    Location
    im
    Posts
    838
    Tokens
    1,621
    Habbo
    Teabags

    Latest Awards:

    Default

    Just how well do you need these answering.
    I year 10 doesn't seem like you need loads written - unless it's like essays? Not sure how much depth you want to go into.

    But a DoS attack is where an attacker is able to gain access to a whole host of computers and be able to control them/ block things from the computer; e.g. internet access.

    Much like a logic bomb - once an 'attacker' has successfully entered the system, they tend to leave it there for a period of time before triggering it and bringing down the businesse' network - they can use it to essentially blackmail the company into succumbing to their demands i.e some form of payment in order to lift the attack and not wipe their server; otherwise they will 'deny them service'.


    Generally, all they need is someone to accept them into the system in order to get them through the firewall. For example it can be something as simple as an email attachment.

    Other things can be used though such as programming tools such as hping or socket programming. (but this is NOT needed for your essay).



    THIS ALL NEEDS TWEAKING! ^
    Would write more, but I am super tired and haven't slept in two days.

    Enjoy Summer!

    These demands may not be very large, generally because they have to be cheaper than installing all back up drives and restarting their internet access.

    superhappy.


  4. #4
    Join Date
    Jun 2005
    Location
    Hampshire
    Posts
    490
    Tokens
    91

    Default

    Quote Originally Posted by Teabags View Post
    Just how well do you need these answering.
    I year 10 doesn't seem like you need loads written - unless it's like essays? Not sure how much depth you want to go into.

    But a DoS attack is where an attacker is able to gain access to a whole host of computers and be able to control them/ block things from the computer; e.g. internet access.

    Much like a logic bomb - once an 'attacker' has successfully entered the system, they tend to leave it there for a period of time before triggering it and bringing down the businesse' network - they can use it to essentially blackmail the company into succumbing to their demands i.e some form of payment in order to lift the attack and not wipe their server; otherwise they will 'deny them service'.


    Generally, all they need is someone to accept them into the system in order to get them through the firewall. For example it can be something as simple as an email attachment.

    Other things can be used though such as programming tools such as hping or socket programming. (but this is NOT needed for your essay).



    THIS ALL NEEDS TWEAKING! ^
    Would write more, but I am super tired and haven't slept in two days.

    Enjoy Summer!

    These demands may not be very large, generally because they have to be cheaper than installing all back up drives and restarting their internet access.
    you are wrong

  5. #5
    Join Date
    Feb 2009
    Location
    im
    Posts
    838
    Tokens
    1,621
    Habbo
    Teabags

    Latest Awards:

    Default

    Quote Originally Posted by ben View Post
    you are wrong
    ill get it right later.

    superhappy.


  6. #6
    Join Date
    Jan 2010
    Location
    United Kingdom
    Posts
    846
    Tokens
    1,766
    Habbo
    triston220

    Latest Awards:

    Default

    Contrary to what Teabags said, a DoS (Denial of Service) attack is one computer constantly sending data to a server. The size of data sent, among other things, determines how long it will take for the server to crash, if at all. With the technology available now, DOS attacks are almost useless.

    DDoS (Distributed Denial of Service) attacks are identical to DoS attacks in every aspect but one. A DoS attack consists of one computer, whereas a DDoS attack uses many. Because of this, they are more damaging to its target. A prolonged DDoS attack usually results in a website or server being inaccessible for a length of time, even after the attack has stopped. This means that a company who is targeted by a DDoS attack can lose a substantial amount of money through loss of sales.

    The technical ability needed to perform either of these attacks is surprisingly small. To initiate a DoS attack, an attacker only needs to know to make a simple script. Performing a DDoS attack is harder, but only slightly. An attacker can download special software which he can configure to his needs. Once he's done that, a file will be created for him to spread, usually over the internet and bound with an application his victims will want to download. Once his victims open the file, they become his "botnet", which he can use to perform the attacks.

    If I've understood correctly, Teabags was talking about RATs. (Remote Administration Tools) RAT victims are infected through the same way that a botnet victim is, and many RATs actually have a DDoS feature built in to them. They also usually have a whole host of other features, but their primary feature is the ability for the RATs "owner" to watch what their victim is doing.
    Last edited by triston220; 25-07-2011 at 08:37 PM.


    Quote Originally Posted by Jaaaack! View Post
    See, however much I want this, my girlfriend uses my PC too much, and I would be killed.





Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •