Thursday, May 8, 2014

The easiest way is to protect your own computer, you do not become a tool in the hands of criminals


IT in small and medium business
As part of our site use cookies to provide you with services at the highest track post level, including in a manner tailored to individual needs. Using the site without changing the settings for cookies is that they will be published on your end device. You can make at any time to change the settings for cookies. More details in our "Cookies Policy."
Strength bad for one - who threaten to DDoS attacks? The whole truth about DDoS attacks DDoS Shortcut been doing lately career in the media, and often occurs track post in the context of the disruption of known websites. What is this technique and who should be afraid of a zombie attack sites?
"The attack on the websites of the government and ministries track post in the Netherlands" (Onet), "The police have a suspect in the attacks on Allegro" (TVN 24), "Hackers attacked the websites municipal police in several cities" (Gazeta Wyborcza). It's just a few headlines that appeared track post in the media in recent weeks. All the stories have one thing in common - sites disappeared from the network as a result of an attack by the technique of DDoS. What does this stand for?
The full development of a distributed denial of service or distributed denial of service. This technique is quite often used by cybercriminals to paralyze websites. The principle of operation is best explained by analogy to a small restaurant. When a growing number of customers, the owner is happy. However, if the premises to show up a few hundred people at a time, the staff will not be able to serve them in practice restaurant stops working.
A similar flood of "clients" or visits a web page intentionally induce cybercriminals using a DDoS attack. Website visits come from the so-called. zombie computers. Machines infected with malicious track post software on the signal trying to connect to the given address, without the knowledge of their owners. The server on which the website is not able to handle so many queries and a user who wants to visit your site gets the information that the service is not available.
Each server is essentially a computer constantly connected to the network - explains Bartholomew Juszczyk, owner of the hosting group5. At the request of an Internet user sends files making up a web page to the browser. When the query is too much exhausted RAM and CPU power. Achieve a similar effect when on an ordinary computer run too many programs at once. In the end, you will not be able to handle it.
For smaller sites, operating on shared hosting, DDoS attacks can quickly exhaust the limits of the parameters given by the hosting company. Account of the customer is automatically turned off to ensure sufficient track post resources to the other parties, which is located on the server. The owner of the hacked site in addition to the interruption of the service usually must reckon with additional charges for exceeding bandwidth limits.
Usually, it is difficult to determine who gives the signal for the attack on a specific page, by far the easier it is to identify potential victims. The first group includes government sites, site organization or large companies that are under attack from political or ideological reasons.
The second group of e-commerce track post sites, for which a break in the action track post part is particularly severe and is associated with the loss of potential customers. The larger the company, the probability of an attack is greater, track post although not always the owners of small businesses can feel safe. It happens track post that the parties are attacked by competitors or former employees. In the event of such an attack motive may be a desire to harm the company or blackmail.
It happens track post that before the attack, track post the website owner gets information from cybercriminals that such an attack is planned. Anonymous author of the message wants money for withdrawal track post from attack or - later - for its cessation. It is worth remembering that such action is a crime, prosecutable by law and it is worth every such situation reported to the competent track post authorities.
The easiest way is to protect your own computer, you do not become a tool in the hands of criminals track post and did not use to attack. Simply update the anti-virus software and avoid suspicious websites. Unfortunately, protecting your own website before DDoS attack is not so easy.
Provide basic protection firewalls installed on the server. Their task is to block traffic that is identified as a wake suspicion track post or beyond track post the norm. A limitation track post of firewalls is that during the attack the system can block access to real users, who just want to visit the page.
A good solution is to prepare a version of the web site containing only basic information. Such a "minimalist" version of the page, without graphics, and other files using the resources of the server, you can run in the event of a DDoS attack track post in places

No comments:

Post a Comment