Account confirmers, Anti-spam team, Confirmed users, Bureaucrats and Sysops emeriti
4,925
edits
No edit summary |
No edit summary |
||
(3 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{{sidenote|This is an example of a page devoted to a specific technical issue. It should explain it in | {{sidenote|This is an example of a page devoted to a specific technical issue. It should explain it clearly, with minimal jargon (and links to explain any necessary technical terms), and in a way unrelated to any specific legislation.}} | ||
__TOC__ | __TOC__ | ||
Line 11: | Line 11: | ||
===Explanation=== | ===Explanation=== | ||
{{sidenote|The Explanation section gives more detail, with diagrams and metaphors. It addresses common misconceptions. The inline links, explaining technical terms, would be to other | {{sidenote|The Explanation section gives more detail, with diagrams and metaphors. It addresses common misconceptions. The inline links, explaining technical terms, would be to other Inform pages.}} | ||
[[File:Ddos-before.png|400px|thumb|right|Normal operation]] | [[File:Ddos-before.png|400px|thumb|right|Normal operation]] | ||
Line 26: | Line 26: | ||
Because the attacker is often anonymous and can be controlling the DDoS from anywhere in the world, legal action is unlikely to be effective against such an attack. The best mitigations are well-designed servers, hardware firewalls, competent technical staff, and a capable and responsive web hosting service and ISP. | Because the attacker is often anonymous and can be controlling the DDoS from anywhere in the world, legal action is unlikely to be effective against such an attack. The best mitigations are well-designed servers, hardware firewalls, competent technical staff, and a capable and responsive web hosting service and ISP. | ||
==Resources== | ==Further Reading and Resources== | ||
{{sidenote|The Resources section | {{sidenote|The Further Reading and Resources section gives links to presentation slides, images, videos or other useful explanatory content.}} | ||
[http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service attack] on Wikipedia | * [[Media:ddos.odg|OpenDocument Graphics file of diagrams on this page]] | ||
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service attack] on Wikipedia |