answersLogoWhite

0

A denial of service attack is a technique that hackers use once they have already gained access to an individual computer, or a larger network. They essentially keep the computer or network so busy that it cannot access the internet. One would not use this technique to stop hackers. Strong virus and malware protection, coupled with a firewall, is the best defense.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

When hackers use zombie computers to launch an attack on another computer or website the attack is know as what?

distributed denial-of-service attack or known as DDoS


What are the two most common computer attacks?

Attack by viruses attack by hackers


What is attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or email?

A Denial of Service attack (Abbreviated as DoS).


How Hackers Can Attack What if your Computer and why they do it?

I'm not sure tig ol bitties


When hackers use computers to launch an attack on another computer the computers used to stage the attack are known as?

zombies


Can a denial service attack be used to deny hackers?

Only Temporarily, they always find a way!


What is a powerful form of attack upon a website that is difficult to guard against and often involves an organized team of hackers?

denial of service


Hackers and spammers cause stress which cause a homicide either stroke or heart attack or worse they kill the computer operator?

Yes,it is possible, the stress level that hackers and spammers put on unaware PC operators could and may have already caused a heart attack or stroke, do you feel this could or should be used in a computer related homicide and be prosecuted? I do..


What type of attack uses trusts between computers to attack a sepecific computer?

Transitive Access


Which piece of software is designed to protect against unauthorized communications to and from a computer?

Firewalls help to protect you from hackers trying to gain access to your computer. They monitor network traffic and detect suspicious activity, such as repeated pings to a specific port (which could indicate a port scan followed up by an attack) and malformed packets.


What has the author Salvatore J Stolfo written?

Salvatore J. Stolfo has written: 'Insider attack and cyber security' -- subject(s): Cyberterrorism, Computer hackers, Computer networks, Computer crimes, Congresses, Computer security, Security measures, Prevention


Why is standalone safe from hackers?

Standalone systems are generally considered safer from hackers because they are not connected to the internet or any external networks, reducing the attack surface significantly. Without network access, the likelihood of remote exploitation is minimized, making it harder for hackers to gain entry. Additionally, standalone systems often have limited access to sensitive data, further protecting critical information. However, they are not completely immune, as physical access or insider threats can still pose risks.