TITLE

New denial-of-service weapon uncovered

AUTHOR(S)
McCarthy, Jack
PUB. DATE
May 2000
SOURCE
Network World;05/22/2000, Vol. 17 Issue 21, p58
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on the mstream tool used for distributed denial-of-service attacks on Web sites. Effectiveness in avoiding defenses placed by Web sites; Ways in which computer hackers disable Web sites in distributed denial-of-service attacks; Software incorporated into the mstream tool.
ACCESSION #
3175297

 

Related Articles

  • OpenHack 4: No news is good news. Rapoza, Jim // eWeek;11/4/2002, Vol. 19 Issue 44, p14 

    Reports on the performance of the OpenHack4 website in an interactive online security test. Number of attempted attacks on the site; Types of attack on the site.

  • Top Ten Reasons Web Sites Fail.  // Enterprise/Salt Lake City;4/28/2008, Vol. 37 Issue 44, p15 

    The article lists the top ten reasons web sites fail, which include that web sites are confusing to use, they are out of date, and that there are hidden security flaws and unknown liabilities.

  • Now Comes the Post-Bubble Chaos. Fixmer, Rob // Interactive Week;4/23/2001, Vol. 8 Issue 16, p6 

    Discusses the effect of the failure of Internet companies on computer network security. Article on a form of theft by price changing on Web sites; Risk of uncontrolled sale of client information; Role of layoffs in enterprise security.

  • OpenHack 4 finale: Are Web apps safe? Lundquist, Eric // eWeek;12/2/2002, Vol. 19 Issue 48, p5 

    Reports on security evaluation of the OpenHack4 Web site of the newsweekly 'eWEEK.' Procedure adopted by the newsweekly to evaluate its web site security; Other security evaluations conducted by the newsweekly; Revelations of the security evaluation test.

  • Network security: it's not just about computers anymore. Adam, Greg // Communications News;Jun2000, Vol. 37 Issue 6, p32 

    Provides information on how Web sites can protect themselves from denial-of-service attacks. Three main part of information security; Recommendation for companies taking approach to network security management.

  • BEHAVIOR-BASED NETWORK INTRUSION PROTECTION DEBUTS.  // Computer Security Update;Feb2003, p3 

    Reports on a computer network security device that detects an unknown attack patterns, which was launched by Psynapse Technologies' Checkmate (R) Intrusion Protection System. Exposure and vulnerability of software companies to Web attacks; Identification of harmful behavior with accuracy;...

  • Now, that's service.  // Catalog Age;03/15/99, Vol. 16 Issue 4, p8 

    Reports on the response rates of commercial catalog firms to e-mail inquiries regarding Web site privacy in the United States. Retail segments represented by the responding firms; Improvements in response rates.

  • Open Systems opens reseller Web site.  // Accounting Technology;Jul99, Vol. 15 Issue 6, p10 

    Cites Open Systems' establishment of a password-protection section of its Web site to enable value-added resellers (VAR) to communicate with each other. Sections into which the VAR are site is divided.

  • Useful Tools. Lininger, David // Teacher Librarian;Oct2001, Vol. 29 Issue 1, p28 

    Discusses the importance of computer filters in schools and public libraries. Common argument of the opponents of filtering; Information on under-blocking of Web sites; Use of filters; Reasons public libraries need to be filtered.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics