DATA DOCTORS

Is your computer a zombie soldier?

Oct 30, 2014, 12:23 AM | Updated: 12:23 am

What is a denial of service attack and how can I protect myself from them?

The basic concept behind a denial of service attack is to flood a website with so much traffic that it overloads the host server, making it inaccessible.

The best analogy I can think of is a radio station contest for a valuable prize. The on-air personality announces that the 20th caller will win, which causes a huge flood of phone calls to the radio station contest line.

The vast majority of the callers will get a busy signal because far too many people are trying to access the same phone line at the same time. The Internet equivalent of this is malicious and makes it nearly impossible to reach a targeted website, which is akin to taking the site down.

Denial of Service (DoS) attacks are generally perpetrated on high-profile targets and commonly as a form of protest or by those that consider themselves “hactivists” or anarchists.

NSFocus, a security firm, estimates that an average of 28 DoS attacks occurred every hour somewhere on the Internet in 2013 as new attack methods designed to stay ahead of defensive measures surfaced.

There is no way to stop someone from making your business a target, but using resources like the ones from CloudFlare can help fight DoS attacks when they happen.

Although DoS attackers generally aim for high-profile targets, any website can become a victim of this type of attack because of how easily they can be executed these days.

The source of the attack are thousands of average computer users that have not kept their computers updated and properly secured. These neglected computers have been silently infected with malware and become unwitting soldiers in a virtual zombie army known as a “botnet.”

Botnets (from roBOT NETworks) are a huge network of infected computers that can be remotely commanded by a single hacker to perform all manners of illicit activity on the Internet with a few keystrokes.

Just about everything we all complain about — viruses, spam, adware, spyware, brute-force attacks, DoS attacks, etc. — are being silently sent from these infected computers because botnets can be rented by the hour in cybercrime circles.

The irony in this is that many people that are complaining about all of the nefarious garbage on the Internet are actually, unknowingly, the perpetrators.

Computers that take forever to startup or that seem to drag along when you’re trying the surf the Internet are classic indicators that something unnecessary is running in the background, but far too many people ignore these symptoms.

The problem has gotten so widespread that the Department of Homeland Security has taken to dispatching regular warnings to average citizens about the importance of maintaining proper security on home computers.

The concern for DHS is that attacks on infrastructure are likely to come via botnets as the number of silently infected computers grows in the U.S.

So, before you complain about hackers, spam and malicious garbage, make sure you’re not actually contributing to the problem by ignoring the signs of infection.

Data Doctors

(Pexels photo)...

Ken Colburn, Data Doctors

Here’s what a Wi-Fi analyzer app is used for

Wi-Fi has become an essential utility for most homes and making sure the signal is adequate in high usage areas is key.

1 day ago

(Pexels File Photo)...

Data Doctors

Here are all of the pros and cons of HP’s All-In printer plan

Each brand tries to differentiate itself from the rest of the crowd by creating unique features and in HP’s case, the subscription model is their latest offering.

8 days ago

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can ma...

Data Doctors

Here are all the tips we know regarding how to spot deep fake videos

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can make detection a bit more difficult.

15 days ago

Patrick Mahomes #15 and head coach Andy Reid of the Kansas City Chiefs are recorded on a phone as t...

Data Doctors

Handy tech tips all Valley residents should use to find lost phones in a snap

Q: My phone went missing, and I haven’t been able to locate it using the Find My service, so what should I do next?

22 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are tips for freeing up Google storage space

Google provides a generous amount of free online storage but it can fill up quickly depending on how many of its resources you use.

29 days ago

Discover how to assess, estimate, and shop for the right battery pack with this concise guide. (Pex...

Data Doctors

Here is everything you need to know for testing and buying battery banks

Discover how to assess, estimate and shop for the right battery pack with this concise guide.

1 month ago

Sponsored Articles

...

Condor Airlines

Condor Airlines can get you smoothly from Phoenix to Frankfurt on new A330-900neo airplane

Adventure Awaits! And there's no better way to experience the vacation of your dreams than traveling with Condor Airlines.

...

DESERT INSTITUTE FOR SPINE CARE

Desert Institute for Spine Care is the place for weekend warriors to fix their back pain

Spring has sprung and nothing is better than March in Arizona. The temperatures are perfect and with the beautiful weather, Arizona has become a hotbed for hikers, runners, golfers, pickleball players and all types of weekend warriors.

...

Day & Night Air Conditioning, Heating and Plumbing

Day & Night is looking for the oldest AC in the Valley

Does your air conditioner make weird noises or a burning smell when it starts? If so, you may be due for an AC unit replacement.

Is your computer a zombie soldier?