answersLogoWhite

0

D.D.O.S every one, no matter the operating system is vulnerable.

See related link.

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

What type of attack are bluetooth cell phones most vulnerable to with auto-discovery enabled and auto-pairing disabled?

BlueJacking


Often the devices most vulnerable to attack are those that provide services to inside users?

True


Which part of DNS is most vulnerable to an attack from a malicious user and why?

A Primary Master Server that provides recursive answers is the most vulnerable to an attack from a malicious user because if a Primary Master Server provides recursive answers it is more easily subverted by a DoS attack than one that only provides iterative answers.


Which part of DNS is most vulnerable to an attack from a malicious user an why?

A Primary Master Server that provides recursive answers is the most vulnerable to an attack from a malicious user because if a Primary Master Server provides recursive answers it is more easily subverted by a DoS attack than one that only provides iterative answers.


What is the Opposite of vulnerable?

The opposite of vulnerable is invulnerable, meaning not susceptible to harm or attack.


WHICH IS THE MOST VULNERABLE STEP IN THE TERRORIST PLANNING CYCLE AND WE AS AIRMAN CAN CONTRIBUTE TO ATN?

Pre-attack Surveillance and Planning


Which is the most vulnerable step in the terrorist operational planning cycle and we as airman can contribute to atn?

Pre-attack Surveillance and Planning


What country do you think are vulnerable to attack?

Any country that does not have a Military or Ministry of Defense are potentially vulnerable to attacks.


What country do you think are vulnerable to attack now?

Any country that does not have a Military or Ministry of Defense are potentially vulnerable to attacks.


How is Mesopotamia vulnerable from attack?

There were no natural land forms protecting it


What action showes that japan was vulnerable to attack?

The Doolittle Raid .


What kind of attack is SSH1 most vulnerable to?

Join ITT Technical Institute and refer the " Practical guide to Fedora and Redhat Enterprise Linux"