Results 1 to 5 of 5

Thread: Different possibilities of Attack from internet

  1. #1
    Join Date
    Nov 2009
    Posts
    624

    Different possibilities of Attack from internet

    Hi,
    I am searching for different types of attacks which are most common for all users. Just pure internet based. The same I am facing from last week and not able to determine the types here. I also want to share the same information with the other people in my place and get them aware about it. I need a list of most possible attacks from internet. I have some details about it but that is half. Thanks in advance.

  2. #2
    Join Date
    May 2008
    Posts
    2,945

    Re: Different possibilities of Attack from internet

    There are many types of attacks which confuses a user what solution to go in order to avoid. I am listing you some of few. In the first category lies the most normal vulnerabilities. These are called worms. Worm take out advantage of open port in a PC and then connect them self with internet if the firewall of a system is not so strong enough. They are mostly found online. A powerful firewall system is recommended for this.

  3. #3
    Join Date
    Feb 2008
    Posts
    2,635

    Re: Different possibilities of Attack from internet

    The other type of wide range of attacks is a common type of DoS / DDoS / synflood. These attacks consist of sending the server a lot of http requests, this requests are for information or connections to exceed its processing capacity. The server overload and then ends. It simulates TCP connection requests, that network management is providing, and makes the attack more successful.

  4. #4
    Join Date
    Jan 2006
    Posts
    4,221

    Re: Different possibilities of Attack from internet

    IP spoofing is to spoof an IP address. In the case of a site operator's ip is popped up to several servers. The attacker then tries to pass for one of its machines to access privileged. One more type of common threat is the mailbombing, as its name suggests, the aim to fill up a users inbox with mails. And that too all junk. Other type of attack is the portscan. It is not really an attack. It is conducted to identify open ports on the target of a future attack. The result of portscan can highlight the presence of security vulnerabilities that can be exploited by an attacker.

  5. #5
    benthomas Guest

    Re: Different possibilities of Attack from internet

    Hi,

    There is a high risk of spy-wares to get installed on your system. You can unknowingly install spy-ware when you install new software, most commonly freeware or shareware P2P (peer-to-peer) file-sharing programs.

    Regards
    Ben Thomas

Similar Threads

  1. wormhole attack and simulating blackhole attack in ns-2
    By mANICKAVASAN in forum Networking & Security
    Replies: 9
    Last Post: 02-02-2012, 12:16 AM
  2. Recent Attack History on Norton Internet Security 2012
    By Hollyn in forum Networking & Security
    Replies: 4
    Last Post: 07-09-2011, 08:44 PM
  3. DOS attack while accessing internet
    By Duggars in forum Technology & Internet
    Replies: 6
    Last Post: 15-12-2010, 10:43 PM
  4. Unable to use Firefox and Internet Explorer after Virus attack
    By KADIN in forum Technology & Internet
    Replies: 5
    Last Post: 23-12-2009, 10:11 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,750,018,682.51350 seconds with 16 queries