Denial-of-service attacks could come during Y2K weekend.
Published:
31 December 1999 y., Friday
As the pre-Y2K hype enters its final phase, computer watchdogs have identified twonew techniques for bringing Internet sites down: One of the denial-of-service attacks is nicknamed TFN2K, the other is called the "Mac Flood Attack." Neither of them is directly related to the Year 2000 computer bug itself, but the failures they cause could be misinterpreted as New Year_s glitches.
TFN2K is a variant of a previously reported denial-of-service attack known as TFN or Tribe FloodNet . The attacker can make it look like data requests are coming in from multiple sources - which makes it harder to track down the source of the attack.TFN2K adds another twist by intentionally sending data errors "designed to crash or introduce instabilities in systems," the center said. CERT advised system administrators to follow industry guidelines to guard against denial-of-service attacks, and to install filtering software that recognizes when Internet traffic is coming from bogus sources.
The second attack strategy targets Apple Macintosh computers running the MacOS 9 operating system with full-time connections to the Internet (under some conditions, systems using MacOS 8.6 also may be vulnerable). John Copeland, a computer engineering professor at the Georgia Institute of Technology, reported that an attacker could send relatively small amounts of fake data in such a way that the Macs would be triggered to send larger transmissions in reply.
Šaltinis:
MSNBC
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
IBM will bulk up its line of Opteron-based products later this year with the roll-out of a new workstation
more »
After years as working implementations, the Voice XML 2.0 (VXML) and Speech Recognition Grammar Specifications (SRGS) won the World Wide Web Consortium's (W3C) seal of approval Tuesday
more »
Nortel Networks Selected by Telekom Baltija to Deploy CDMA2000 1X 450 in Latvia; Network Planned to Offer Voice, High-Speed Data Services
more »
The European Parliament approved a controversial piracy law that would allow local police to raid the homes and offices of suspected intellectual-property pirates
more »
search.lt presents newest links
more »
"Unicaster" – for advertising, announcements, presenting nightly life in Vilnius...
more »
Such editions as encyclopaedias, dictionaries, albums and geographical maps were issued on the CDs at first. Nowadays majority of the libraries, archives and museums is concerned of their funds’ security thus they are accumulating the copies of the books in the electronic libraries.
more »
The most-read webloggers aren't necessarily the ones with the most original ideas, say researchers at Hewlett-Packard Labs
more »
Removing the media player from Windows may help level the playing field for competitors
more »
Company also readies Flex framework
more »