tag:blogger.com,1999:blog-6445350684895721748.post6343904537643860856..comments2023-10-06T13:26:20.357+01:00Comments on Welcome to Most Wanted IT Technology: Denial Of ServiceUnknownnoreply@blogger.comBlogger2125tag:blogger.com,1999:blog-6445350684895721748.post-29291287408046788562009-02-23T14:22:00.000+00:002009-02-23T14:22:00.000+00:00thanx . U r right ..thanx . U r right ..Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-6445350684895721748.post-73576048334269720702009-02-22T17:02:00.000+00:002009-02-22T17:02:00.000+00:00You forgot another 2 classifications!1-Viruses:Com...You forgot another 2 classifications!<BR/><BR/>1-Viruses:<BR/>Computer viruses, which replicate across a network in various ways, can be viewed as denial-of-service attacks where the victim is not usually specifically targetted but simply a host unlucky enough to get the virus. Depending on the particular virus, the denial of service can be hardly noticeable ranging all the way through disastrous.<BR/><BR/>2-Physical Infrastructure Attacks:<BR/><BR/>Here, someone may simply snip a fiber optic cable. This kind of attack is usually mitigated by the fact that traffic can sometimes quickly be rerouted.<BR/><BR/>There are ways of preventing many forms of DoS attacks.Anonymousnoreply@blogger.com