DDOS Attack - Severe Commonness for Investors

Updated: 05/23/2005 21:24
Reprints/Permissions  Hyip Monitor
None of famous and popular programs could escape the common lot of going off-line lately. As everybody knows, in the investors' society this fact is interpreted as scam. Though, not always "disappearance" happens through admin's or hosting's faults.


More often these are real trespassers attacks, aimed at shutting down the program. These are DDOS attacks. After such attacks programs inform that they were attacked, however, it happens so often that soon DDOS will be interpreted as the lame excuse. Too bad one needs just to investigate.

Statistics shows that every 5 minutes there are 2 attacks in the world, aimed at disabling net resources. It can be competitors struggle, rivals dirty tricks, anything. Especially since there are lots of them in the HYIP world. Not mentioning the offended investors and other avengers, noble ones and vice versa.

DDOS attack - abbreviation from Distributed Denial Of Service Attack. The first mentioning about "deliberate" DDOS date from the year 1996, and closer to 1999, Amazon, Yahoo, CNN, eBay, E-Trade made the acquaintance of such kind of terrorism. What outstanding is there in this terrible kind of computer terrorism? It's simple.

Each of you, dear investors, has probably come across the situation when your computer started to work slower than usual. More often it has to do with processes usage. I.e. some programs, working at the same time or downloads from Internet. Now, just imagine, that the number of such processes is not ten there are hundreds, thousands of them! And they all attack you poor PC.

Of course computers, supporting web-sites are much more powerful, but the number of processes it has to process during attacks sometimes exceeds multidigit numbers and powers. At the same time it's easy to cause the process on server (the place where web-site under attack is located) from the outside one just needs to send a request!

Thousands of requests! Millions of requests! Sending them simultaneously (from 500 000 per second), trespassers simply put the server out of action and web site gets to be inaccessible.

No Syncinvest, no ONEinvest. It may seem strange on the one hand, cause sooner or later the site will get down to work again and will keep on working. Not everything is so easy. Organizing the attack properly by the group of qualified hackers, web site buzzing can last for some days. And the fact it will appear on forums in the SCAM section is half-way to success.

The second half of course these are financial losses, suffered by a program while being out of action. Can you imagine how much a program is losing, working without a break on-line with the funds, if 1 minute buzz of the resource, managing the production costs next to nothing $13 000.

ONE MINUTE! The minute of the resource, managing the supplies costs $11 000, and the site, dealing with e-commerce $10 000! Count please!

The attacks themselves are organized in the following way. First there was only one PC, one target, and one program. Which was created to test the network capacity and their stability towards environmental stresses.

It sent automatically requests of various complexities, and analysts measured the functioning of the network. Later on programs like that passed from hand to hand. And became available to ANYONE. You need it download and use it.

Of course hackers couldn't miss such a nice means. Originally, ordinary usage of such a program is ineffective, and it's also not hard to catch such an attacker. That is why now requests are sent not from one PC, but from some of them. Application program is enriched with various protection rates.

Further on, the simplest DDOS network (DDOS exactly, not DOS) is the NETWORK of computers, among which there are organizers, agents, zombies, and directly attacking PC. The signal to start attack is given from the main computer, via agents to zombie and attack begins. The worst and the most insulting is that any computer may be zombi, even yours how do you like it?

The thing is that sending such a quantity of requests is physically impossible from one PC. Although, it may be possible, but the PC should be very powerful. And it makes no sense while struggling HYIP can reject any requests from this or that IP address, working further on.

Hacker needs thousands, ten thousands of computers to form the group? Where to take them? Anywhere virus warnings we are writing to you all the time is not just for your personal security.

As the professionals say virus itself is not so awful. But when a dangerous weapon is made of your computer this is serious. Computer is infected with virus, which remains silent for the time being.

Though as soon as the hacker gives signal it starts to send requests at the times fixed. You can even miss that! And, tracing the feedback, maximum possibility it is your computer. But it is also considered to be a victim.

Of course not the program itself organizes attacks. It's not profitable to have such experienced and professional programmers as employees. They are just hired. And hackers job costs pretty penny, though everything depends on who is attacked. For example, blocking www.microsoft.com for a week costs from 80 thousand dollars. Sometimes attackers use another tactics.

They just halt the work of the site and ask for a redemption-fee. Who knows, maybe recent events are just the series of consequent actions? The thing is that the most popular and really serious programs have been subjected to attacks. Maybe somebody demands the redemption-fee from them now? Anything may happen. Time will show. Let's hope they will slip out.

And to slip out not just money are needed. One also needs to have a good staff of programmers and reliable, working properly security. Though, the specialists say, there's no guaranteed protection form these attacks. Any site can be blocked. Hence the time a program will fight off the trespassers bluntly speaking depends on these two components.

That's all I think. Anyway, now you understand clearly what DDOS is, hope you won't face it.


About the author

Brett Sherpan has been working for seven years writing and editing for online and print media. He has held various editing and copywriting positions and can quickly and competently write copy for sales, marketing and editorial content. Brett is a consistently dependable team player, who thrives in a high-pressure environment, enjoying the challenges of meeting deadlines and am comfortable researching, writing and editing on a wide range of topics
You May Also Like