Flooders are malicious programs that attempt to overload a connection by sending various intrusive attacks, in order to make a computer resource unavailable to its intended user.
Examples of the various attacks implemented to overload a connection are as follows:
- Denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack). Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.
- A ping of death (abbreviated “POD”) is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. Traditionally, this bug has been relatively easy to exploit. Generally, sending a 65,536 byte ping packet is illegal according to networking protocol, but a packet of such a size can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can occur, which often causes a system crash.
- The Smurf attack (or ICMP attack) is a way of generating a lot of computer network traffic on a victim network. This is a type of denial-of-service attack that floods a target system via spoofed broadcast ping messages.
How Can You Detect Flooders? Check for Flooders with SpyHunter!
SpyHunter is a powerful malware remediation and protection tool designed to help provide users with in-depth system security analysis, detection and removal of a wide range of threats like Flooders as well as a one-on-one tech support service.Download SpyHunter's Malware Scanner to Detect Flooders*
Free SpyHunter Remover Details & Terms
There are currently 10 articles listed on flooders.
|AngryPing||March 25, 2008|
|AnOrkyS MSN TOOLZ||July 7, 2007|
|Ashaden Pinger||February 20, 2008|
|Black Hawk||April 19, 2007|
|Boo Bomber 2||April 4, 2009|
|Databound 1.0||June 23, 2008|
|Deadly Network Flood||March 5, 2007|
|FloodBot||January 11, 2008|
|Flooder.AOL.Ikobur||September 10, 2008|
|Flooder.Chat.VB.c||June 3, 2008|