Flooders

Flooders are malicious programs that attempt to overload a connection by sending various intrusive attacks, in order to make a computer resource unavailable to its intended user.

Examples of the various attacks implemented to overload a connection are as follows:

  • Denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack). Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.
  • A ping of death (abbreviated “POD”) is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. Traditionally, this bug has been relatively easy to exploit. Generally, sending a 65,536 byte ping packet is illegal according to networking protocol, but a packet of such a size can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can occur, which often causes a system crash.
  • The Smurf attack (or ICMP attack) is a way of generating a lot of computer network traffic on a victim network. This is a type of denial-of-service attack that floods a target system via spoofed broadcast ping messages.

How Can You Detect Flooders? Check for Flooders with SpyHunter!

SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Flooders as well as a one-on-one tech support service.

Download SpyHunter's Malware Scanner to Detect Flooders
Note: SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. To understand our policies, please review our EULA, Privacy Policy and Threat Assessment Criteria. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

There are currently 10 articles listed on flooders.

Name Date
AngryPing March 25, 2008
AnOrkyS MSN TOOLZ July 7, 2007
Ashaden Pinger February 20, 2008
Black Hawk April 19, 2007
Boo Bomber 2 April 4, 2009
Databound 1.0 June 23, 2008
Deadly Network Flood March 5, 2007
FloodBot January 11, 2008
Flooder.AOL.Ikobur September 10, 2008
Flooder.Chat.VB.c June 3, 2008

Search by Letter:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9