What Is a DDoS Attack?

A distributed denial of service (DDoS) attack is kind of like a traffic jam on a website
What is a DDoS attack and what does it mean for your website? Instead of jumping deep into technical details, let’s start with a real-world analogy that makes it really easy to visualize what a DDoS attack is…

DDoS attack mean

Imagine, for a moment, that it’s a Sunday afternoon and you’re driving down the highway with your family, headed to your favorite picnic spot. You’re cruising down the highway at 70 miles an hour – it won’t be long before you’re at the park enjoying a lovely autumn day!

You check your GPS traffic report, only to see that the jam extends for miles and there’s no way around it. There’s no way you’ll make it to the park in time for your picnic.

That’s basically what a distributed denial of service (DDoS) attack is – lots of users (in this case, cars) that are jamming up a system (the highway) to deny you from accessing a service (the park).

Usually when we talk about DDoS attacks, the resource being denied is a website and the “traffic jam” was maliciously caused by a hacker. But the concept is the same as a traffic jam on the highway. Let’s dive into what DDoS means, the types of DDoS attacks, and methods of DDoS prevention.

Comments

  1. guarantee to be in mysterious, Pakistani Clothes are phony, they don't have the foggiest idea how to hack as they use devices and call themselves "Programmers" they are content kiddies. There are barely any genuine programmers who guarantee to be in mysterious.

    ReplyDelete
  2. I introduced Ubuntu 12.10 on my 8gb usb and it stacks gradually on my work area, at that point the screen keeps on glimmering, graphic design agencies is this since I utilize a Nvidia 550 Ti? On my inspiron dell PC it loads, in spite of the fact that it doesn't permit me to look through wifi systems. I attempted it again at school however got a mistake saying the portion was contradictory with the processor since it didn't bolster pae. This befuddled me the most in light of the fact that it is an intel i5 like my work area at home.

    ReplyDelete
  3. Essentially, logo design company australia a framework is besieged with demands, for the most part from circulated "botnets" until the framework can take it no more and it's presentation is corrupted to the point it wont work any longer.

    ReplyDelete

Post a Comment

Popular posts from this blog

Targeted by DDoS attacks

Test of English as a Foreign Language (TOEFL)