Don't be duped into a denial-of-service attack

Snyder, Joel
March 2000
Network World;03/06/2000, Vol. 17 Issue 10, p49
Trade Publication
Provides tips on how to secure the Internet from denial-of-service attacks by computer hackers in the United States. Getting assistance from Internet service providers; Keeping test systems off the Internet; Constant communication with telecommuters.


Related Articles

  • Post-Hack Attack Strategy: Cooperation? Brown, Doug // Inter@ctive Week;02/21/2000, Vol. 7 Issue 7, p10 

    Reports that the Internet companies are being asked to cooperate with academia and with the United States government to keep the Web safe from hackers. Identification of the companies being asked to cooperate; Issue on whether these companies will get along in one endeavor; Individual...

  • As companies go digital, security risks rise. Banguis, Chris // Indianapolis Business Journal;3/5/2001, Vol. 21 Issue 52, p23 

    Comments on the increased computer security risks from hackers faced by companies who are planning to launch Internet-based operations. Case examples illustrating how companies can become at risk; Explanation of the various ways by which hackers can compromise a corporate Internet and computer...

  • Give up your day job. Els, Frik // Finance Week;2/17/2003, p58 

    Highlights the results of a report from Symantec which cleared some misconceptions of Internet and computer network security. Survey of companies using intrusion detection systems in different countries; Top ten attacking countries in terms of overall volume.

  • Cyberterror 101.  // Getting Results...For the Hands-on Manager: Plant Edition;Apr97, Vol. 42 Issue 4, p7 

    Describes tools used by computer hackers and tools used in computer protection. Computer viruses; Worm programs; Logic bombs; Firewalls; Password protection; Virus checkers.

  • Comprehensive security plan is the best defense against net hackers. Radke, Chuck // Business Journal Serving Fresno & the Central San Joaquin Valley;02/28/2000, Issue 322583, p6 

    Provides tips on how companies in California can protect their computer systems from attacks launched by computer hackers. Performance of a risk assessment of the Internet business; Development of security standards; Tests on system defenses and the performance of an entire system audit;...

  • Our Silence Is Hackers' Greatest Ally. Trembly, Ara C. // National Underwriter / Life & Health Financial Services;11/24/2003, Vol. 107 Issue 47, p20 

    Argues that fear is an obstacle in preventing computer hacking in the U.S. Tendency of hacked firms not to report the incident for fear of having anyone know that their system in vulnerable; Underreporting of hacking incidents.

  • Running Scared. Babcock, Charles // Interactive Week;2/12/2001, Vol. 8 Issue 6, p40 

    Deals with the implication of the denial-of-service attack on several systems of major companies on the need for security. Details on the attack on the system of Microsoft Corp.; Information on the deal signed by Microsoft with Akamai Technologies after the attack.

  • Sabotage in cyberspace. Ward, Mark // New Scientist;9/14/96, Vol. 151 Issue 2047, p12 

    Focuses on the overblown threat to national security from computer hackers. Belief that hostile foreign governments are recruiting hackers to attack and disable data networks in Western countries; More trouble from viruses, error by staff and untested software than from information terrorists;...

  • Openhack III bowed but not broken. Dyck, Timothy // eWeek;01/22/2001, Vol. 18 Issue 3, p14 

    Reports on the computer hacking occurred in the Openhack III site. Detection of the bug in the company's code; Cause of the breakdown of the two Open Hack systems; Discovery of intrusion and attempted log in; Ways to remotely shut down or crash IBM WebSphere application server.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics