Flooders

Flooders are malicious programs that attempt to overload a connection by sending various intrusive attacks, in order to make a computer resource unavailable to its intended user.

Examples of the various attacks implemented to overload a connection are as follows:

  • Denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack). Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers.
  • A ping of death (abbreviated “POD”) is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer. Traditionally, this bug has been relatively easy to exploit. Generally, sending a 65,536 byte ping packet is illegal according to networking protocol, but a packet of such a size can be sent if it is fragmented; when the target computer reassembles the packet, a buffer overflow can occur, which often causes a system crash.
  • The Smurf attack (or ICMP attack) is a way of generating a lot of computer network traffic on a victim network. This is a type of denial-of-service attack that floods a target system via spoofed broadcast ping messages.

How Can You Detect Flooders? Check for Flooders with SpyHunter!

SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Flooders as well as a one-on-one tech support service. Download SpyHunter’s Malware Scanner
to Detect Flooders.
Note: SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. To understand our policies, please review our EULA, Privacy Policy and Threat Assessment Criteria. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

There are 10 articles listed on flooders.

Name Date
AngryPing May 14, 2009
AnOrkyS MSN TOOLZ May 14, 2009
Ashaden Pinger May 14, 2009
Black Hawk May 14, 2009
Boo Bomber 2 May 14, 2009
Databound 1.0 May 14, 2009
Deadly Network Flood May 14, 2009
FloodBot May 14, 2009
Flooder.AOL.Ikobur May 14, 2009
Flooder.Chat.VB.c May 14, 2009

Search by Letter: A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9