Flooders

Flooders are malicious programs that attempt to overload a connection by sending various intrusive attacks, in order to make a computer resource unavailable to its intended user.

Examples of the various attacks implemented to overload a connection are as follows:
  • Denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack). Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.
  • A ping of death (abbreviated “POD”) is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. Traditionally, this bug has been relatively easy to exploit. Generally, sending a 65,536 byte ping packet is illegal according to networking protocol, but a packet of such a size can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can occur, which often causes a system crash.
  • The Smurf attack (or ICMP attack) is a way of generating a lot of computer network traffic on a victim network. This is a type of denial-of-service attack that floods a target system via spoofed broadcast ping messages.

How Can You Detect Flooders?

Download SpyHunter’s Detection Scanner
to Detect Flooders.
* SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

There are 10 articles listed on flooders.

Name Date
AngryPing May 14, 2009
AnOrkyS MSN TOOLZ May 14, 2009
Ashaden Pinger May 14, 2009
Black Hawk May 14, 2009
Boo Bomber 2 May 14, 2009
Databound 1.0 May 14, 2009
Deadly Network Flood May 14, 2009
FloodBot May 14, 2009
Flooder.AOL.Ikobur May 14, 2009
Flooder.Chat.VB.c May 14, 2009

Search by Letter: A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9  
Home | SpyHunter Risk Assessment Model | Privacy Policy | EULA | Additional Terms and Conditions
Copyright 2003-2017. Enigma Software Group USA, LLC. All Rights Reserved.