Page Summary
Active Entries
- 1: Post From Tumblr The folks you meet up with during the yarn crawl this year.... - April 07, 2019 at
- 2: Post From Tumblr deerney: autisticstevonnie: thatdisneyworldblog: I think this... - September 19, 20
- 3: Post From Tumblr peashooter85: Ornate German hand axe, late 16th century. from... - August 14, 2018
- 4: Post From Tumblr annaknitsspock: saratsuzuki: batboyblog: There is a 1970s horror movie that is abou
- 5: Post From Tumblr buttshapedpillow: transasamisato: habitualshaker: dagwolf: dagwolf: spicer said thi
- 6: Post From Tumblr Neighbor sued me after harassing my dog for months, lost horribly. - March 18, 2017
- 7: Post From Tumblr 🚨 BREAKING MEME NEWS
- 8: Post From Tumblr stuffmomnevertoldyou:60 stunning photos of women protesting... - March 08, 2017 at
- 9: Post From Tumblr Photo - February 28, 2017 at 01:20AM
- 10: Post From Tumblr liberalsarecool: How can a veteran, or conservative, or pretty... - February 23, 20
Style Credit
- Base style: Patsy by
- Theme: Clay Deco by
Expand Cut Tags
No cut tags
no subject
Date: 2011-04-06 06:34 pm (UTC)no subject
Date: 2011-04-07 03:37 am (UTC)no subject
Date: 2011-04-07 04:00 am (UTC)One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.
Now, in the case of Livejournal, see
http://blog.foreignpolicy.com/posts/2011/04/05/who_was_behind_the_russian_livejournal_attack