Denial-of-service attacks could come during Y2K weekend.
Published:
31 December 1999 y., Friday
As the pre-Y2K hype enters its final phase, computer watchdogs have identified twonew techniques for bringing Internet sites down: One of the denial-of-service attacks is nicknamed TFN2K, the other is called the "Mac Flood Attack." Neither of them is directly related to the Year 2000 computer bug itself, but the failures they cause could be misinterpreted as New Year_s glitches.
TFN2K is a variant of a previously reported denial-of-service attack known as TFN or Tribe FloodNet . The attacker can make it look like data requests are coming in from multiple sources - which makes it harder to track down the source of the attack.TFN2K adds another twist by intentionally sending data errors "designed to crash or introduce instabilities in systems," the center said. CERT advised system administrators to follow industry guidelines to guard against denial-of-service attacks, and to install filtering software that recognizes when Internet traffic is coming from bogus sources.
The second attack strategy targets Apple Macintosh computers running the MacOS 9 operating system with full-time connections to the Internet (under some conditions, systems using MacOS 8.6 also may be vulnerable). John Copeland, a computer engineering professor at the Georgia Institute of Technology, reported that an attacker could send relatively small amounts of fake data in such a way that the Macs would be triggered to send larger transmissions in reply.
Šaltinis:
MSNBC
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
Microsoft on Thursday announced Hotmail users could block HTML images from appearing in e-mail messages, in a move meant to foil spammers trolling for valid e-mail addresses
more »
Leaders of two much-criticized projects that privacy advocates fear will collect massive amounts of data on U.S. residents defended those projects before the U.S. Congress Tuesday
more »
Site holds resources for hardware and driver software makers
more »
search.lt presents newest links
more »
Business-to-business e-commerce is thriving
more »
Lucent Technologies has been executing the second phase of the ATM multiservice network for Netia, one of Poland's largest independent telecommunications service providers
more »
The difference between spam and desired e-mail is whether the user has previously transacted business with the sender.
more »
Technology is supposed to help simplify transactions and increase the speed of doing business, but often that is not the way it works
more »
The Bureau of Citizenship and Immigration Services will start accepting immigration applications filed through the Internet on May 29
more »
search.lt presents newest links
more »