Editing Hacker
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 10: | Line 10: | ||
Another form of hacking, and one that poses a more dangerous threat to servers are [[DDoS|DDoS attacks]], which basically sends a large degree of [[false clients]] to a targeted server, this in turn overloads the sever and thus crashes it. This form of attack however, is the most easiest out of any other hack in [[JKA]] and [[JKO]]. For the most part, protection against these attacks are also easy to acquire, for many server providers have built in security which protects servers from third party attacks. Another form of [[DDoS]] is the [[getinfo]] exploit, which causes a buffer overload in the server. However, this again is easy to bypass. | Another form of hacking, and one that poses a more dangerous threat to servers are [[DDoS|DDoS attacks]], which basically sends a large degree of [[false clients]] to a targeted server, this in turn overloads the sever and thus crashes it. This form of attack however, is the most easiest out of any other hack in [[JKA]] and [[JKO]]. For the most part, protection against these attacks are also easy to acquire, for many server providers have built in security which protects servers from third party attacks. Another form of [[DDoS]] is the [[getinfo]] exploit, which causes a buffer overload in the server. However, this again is easy to bypass. | ||