facing DDOS Attack

January 11th, 2020

Can any one help me, if someone DDOS Attack on a website than how can we stop them, can you suggest some method or software, which are available.
Answer #1
~ censored ~ you, you cant stop us, we’re everywhere!!!!!
14 day warning given for flaming - GB
Answer #2
~censored~ you, you cant stop us, we're everywhere!!!!!
Its not really an honor to be a Ddosser because it doesn’t take that much skill to do it. Theres just more respectable ways to destroy something. Because we all know DDossing isnt hacking
Answer #3
What kind of operating system are you using on the server?
Answer #4
~censored~ you, you cant stop us, we're everywhere!!!!!
I just askeed for information, i saw a forum in which admin is facing on his website. ok.
Answer #5
~censored~ you, you cant stop us, we're everywhere!!!!!
Its not really an honor to be a Ddosser because it doesn't take that much skill to do it. Theres just more respectable ways to destroy something. Because we all know DDossing isnt hacking

Mate i want the solution for the website to stop such DDOs attack.
Answer #6
@
Don’t pay attention to those ball busters. They don’t want to help. The details of defending against a DDOS depends on what kind of operating system the server is using. You use techniques like blocking all traffic and diverting it to a black hole, where it is discarded; routers can be configured to stop simple ping attacks by filtering nonessential protocols and can also stop invalid IP addresses; intrusion-detection systems will recognize when valid protocols are being used as an attack vehicle and used in conjunction with firewalls to automatically block traffic; proper configuration of server applications will minimize the effect of a DDoS attack. An administrator can explicitly define what resources an application can use and how it will respond to requests from clients.
Answer #7
@
Don't pay attention to those ball busters. They don't want to help. The details of defending against a DDOS depends on what kind of operating system the server is using. You use techniques like blocking all traffic and diverting it to a black hole, where it is discarded; routers can be configured to stop simple ping attacks by filtering nonessential protocols and can also stop invalid IP addresses; intrusion-detection systems will recognize when valid protocols are being used as an attack vehicle and used in conjunction with firewalls to automatically block traffic; proper configuration of server applications will minimize the effect of a DDoS attack. An administrator can explicitly define what resources an application can use and how it will respond to requests from clients.

thanks useful help

 

| Sitemap |