DDoS attacks explained - Compudent Systems
Information Technology Solutions for Dentists and the Dental Industry. Serving the GTA and Southern Ontario.
Dental I/T, Dental Information Technology, Network Security, Toronto, GTA, Dental, Network, I/T, Information Technology, Computer, Data, Abeldent, Dentrix, LiveDDM, Patterson Dental, Henry Schein, K-Dental, Sinclair Dental, Schick CDR, Dexis, Carestream, Carestream Dental, Digital Radiography, X-ray, Dental X-ray, Dental Software Support, Software
bp-nouveau,post-template-default,single,single-post,postid-16727,single-format-standard,theme-bridge,woocommerce-no-js,ajax_fade,page_not_loaded,,columns-4,qode-child-theme-ver-1.0.0,qode-theme-ver-10.0,wpb-js-composer js-comp-ver-4.12,vc_responsive,no-js

DDoS attacks explained

DDoS attacks explained

By Robin Dishon, Senior Writer, ESET

What is a DDoS (Distributed Denial of Service) attack? Here’s how it works, and what you can do to keep your devices from being hijacked by a botnet.

Friday’s massive DDoS (Distributed Denial of Service) attacks on major providers of the internet backbone caused massive interruptions for millions of users and prevented access to dozens of popular websites. Although the issues have been fixed, the incident underscores the need to be prepared.

DDoS attacks such as this take advantage of unprotected computers to create “botnets.” Botnets are collections of millions of infected computers that are used maliciously for attacks. On the right is a graphic describing the process.

Because unprotected computers can be used to create botnets, you can help prevent future DDoS attacks—by ensuring your own computers and devices have effective internet security installed.

ESET security solutions use advanced heuristics and analysis for effective botnet protection, blocking programs that may try to take over your computers as well as detecting and destroying other threats.

Learn more about how you can become part of the botnet solution and enjoy safer technology 24/7.

<Access the original ESET Article HERE>

Source: DDoS attacks explained

Contact us today - How can we help you?