TITLE

Attacked by smurf

AUTHOR(S)
Gibbs, Mark
PUB. DATE
February 1999
SOURCE
Network World;02/22/99, Vol. 16 Issue 8, p36
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Gives an overview of a smurf attack. Smurf attack as a method of denying service an Internet protocol connection; Use of Internet Control Message Protocol (ICMP) to launch the attacks; Effects and costs of being smurfed; Quick fixes/solutions.
ACCESSION #
2583700

 

Related Articles

  • HTTP Request Hijacking Flaw Leaves Mobile Users at Risk. Kerner, Sean Michael // eWeek;10/29/2013, p9 

    The article discusses the details revealed by Skycure mobile security firm researchers on a new mobile threat known as HTTP Request Hijacking (HRH). According to Skycure chief technology officer (CTO) Yair Amit, the HRH flaw entails a persistent feature of a caching code that runs on mobile...

  • Hacker tracker.  // CRN;1/30/2006, Issue 1181, p30 

    The article presents Spi Lab's top five vulnerabilities. These are Suse open enterprise server Novell remote manager HTTP request header overflow vulnerability, PHP 5 user-supplied session ID input validation vulnerability, Bea WebLogic server and WebLogic express Mbean remote information...

  • WEP Cracking. Worthman, Ernest // Wireless Design & Development;Jun2005, Vol. 13 Issue 6, p12 

    Focuses on cracking wired equivalent privacy (WEP) keys. Background on WEP; Information on several common sense rules with regard to the new generation of hacking software.

  • Five facts about today's security.  // Communications News;Jan2001, Vol. 38 Issue 1, p26 

    Deals with the factors contributing to the inadequacy of technology to protect computer networks against intrusion and viruses. Use of of Internet Protocols by computer hackers; Effect of computer viruses on software; Implications of configuration errors.

  • Pick on someone your own age!  // Network World;5/6/2013, Vol. 30 Issue 8, p7 

    The article reports that hackers has abused the distributed denial of service (DDoS) attacks conducted by aging networking protocols such as Network Time Protocol of the financial management solutions provider Harmony Information Inc. which are employed by Internet-connected device.

  • A GUIDE TO SAFER CODING. Schifreen, Robert // SC Magazine: For IT Security Professionals (UK Edition);Jul2005, p44 

    This article presents pieces of advice on how to maintain Web site security. First, do not include confidential information in personal home page (PHP) files because hackers sometimes manage to exploit a bug in PHP code or in the server's configuration that allows them to view the source code...

  • UDP Flood.  // Network Dictionary;2007, p501 

    A definition of the term "UDP Flood" is presented. This is a form of attack wherein an attacker sends a User Datagram Protocol (UDP) packet to a random port on the victim system. When the victim system accepts a UDP packet, it will determine what application is waiting on the destination port....

  • Life after Heartbleed.  // MacUser;Jul2014, Vol. 30 Issue 7, p76 

    The article discusses security certificates and their strength to stop bugs such as Heartbleed. Topics covered include the use of Secure Sockets Layer (SSL) for establishing Hypertext Transfer Protocol (HTTP) secure connection and the Certificate Authorities issuing security certificates such as...

  • Turn off DCom features to protect Windows from future viruses. Adshead, Antony // Computer Weekly;9/23/2003, p25 

    Following the second computer architecture DCom vulnerability, users have been advised to turn off the services in Microsoft operating systems that could be vulnerable to worms similar to August's Blaster outbreak. The DCom security hole involved Remote Procedure Call (RPC), a protocol used by...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics