What is DOS attack?
DOS attack is a form of a harmful action that is usually done against a computer system, such as a server host or a website. This type of attack can also be used against smaller systems, such as the central processing unit (CPU) of the computer, although it is quite unusual. The purpose of the attack is that the server becomes available for use by legitimate users. DOS attack can have a number of different forms, although in general it is intended to either overcome the system by floods or inappropriate system.
DOS attack objective, which means "rejection of service" and should not be confused with the operating system or DOS. "Denying the Service" means that the system is attacked in some way that ultimately leads to the system is no longer able to respond to legitimate customers or users of the service. The service is therefore denied to individuals who are trying to navigate the web or sign in to the server that focused.
attack intoS can have a number of different forms, although it is usually designed to achieve one of the two end results: a flood of server or server crashes. The flood is achieved by trying to respond to an excessive number of users at the same time, often using a “spoof” program by more non -existent users who use the resources of the system and cause it not to respond. Server crashes are usually achieved by a malicious piece of software that uses an error or weakness in server programming to collapse the server and is inaccessible until restarting.
One of the reasons why DOS attacks can be so disturbing is that this type of attack can be relatively easy to start and can continue for days or weeks. DOS attack can also be launched as a "permanent" attack that has been trying to reduce the server for a long time. This is the USULly done by obtaining access to the firmware on the server and "flashing" the server with a new firmware that is damaged or malicious, reduces the server down until the system is repaired or replaced.
DOS attack can also be unintentional and still achieve similar results. If a website or server is impressed by legitimate user requirements, for example, when a popular site refers to a smaller page on a server that cannot handle a larger server user capacity, the server can flood or collapse. Although it does not necessarily have to be an "attack", it is often considered similarly disturbing and can be an unfortunate consequence of a small website that becomes quite suddenly popular.