IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Denial of Service Attacks

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Distributed Denial of Service Attacks, Teardrop Attacks, Denial of Service Prevention, DOSA, Packet Monkey, Attacks, DDoS Attacks, DNS Attacks, Smurfing, Denial-of-service Attack, D o S Attacks, DoS Attacks, Smurf
DEFINITION: On the Internet, a packet monkey is someone (see cracker, hacker, and script kiddy) who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network. Packet monkeys typically use tools created and made available on the Internet by hackers. According to one writer's distinction, a packet monkey, unlike a script  … 
Definition continues below.
Denial of Service Attacks IT Downloads (View All Report Types)
51 - 63 of 63 Matches Previous Page  |  Next Page
SQL Compliance Manager: Go beyond traditional auditing approaches with real-time monitoring
sponsored by Idera
SOFTWARE DOWNLOAD: DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

What a Business Email Compromise Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Gain insight into how to avoid falling prey to these email scams and protect your enterprise's data. Discover not only the intricacies of these attacks, but how to ensure every member of your team is interacting with trusted email sources.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

What a Fraudulent Invoice Email Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Email security is integral to the smooth operation of pretty much any business. In this webcast, learn how to combat targeted attacks, spear-phishing, and disguised malicious emails dressed up to look and sound legitimate.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices
sponsored by SpectorSoft
PRODUCT DEMO: Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!
Posted: 23 May 2013 | Premiered: 23 May 2013

SpectorSoft

Symantec Endpoint Protection 12 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: Access this trial software by Symantec and discover the benefits of effective endpoint security.
Posted: 21 May 2014 | Premiered: 21 May 2014

Symantec Corporation

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

Symantec Protection Suite Challenge
sponsored by Symantec Corporation
SOFTWARE DEMO: Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.
Posted: 28 Jul 2009 | Premiered: 28 Jul 2009

Symantec Corporation

Symantec Protection Suite Enterprise Edition
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
Posted: 18 Jun 2009 | Premiered: 18 Jun 2009

Symantec Corporation

Try Office 365 for free for 30 days
sponsored by Microsoft
TRIAL SOFTWARE: Receive a 30 day no-risk trial of Office 365, a suite of Internet-based services devised to help meet your needs for robust security, 24/7 reliability, and user productivity.
Posted: 01 Jan 2012 | Premiered: 23 Dec 2011

Microsoft

Unified Security Management: Real-time Threat Detection
sponsored by AlienVault
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AlienVault

Vyatta Community Edition 4 - Open-Source Routing and Security
sponsored by Vyatta Inc.
TRIAL SOFTWARE: Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products.
Posted: 11 Sep 2008 | Premiered: 01 Sep 2008

Vyatta Inc.

What’s New with IBM Cognos Business Intelligence V10.1
sponsored by IBM
PRODUCT DEMO: See what's new in IBM Cognos Business Intelligence V10.1 that makes it possible to connect everyone in your organization with the insight, analytics and information they need to make better, faster, smarter decisions.
Posted: 07 Feb 2011 | Premiered: 07 Feb 2011

IBM

Worry-Free Business Security Services
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.
51 - 63 of 63 Matches Previous Page    1 2 3    Next Page
 
DENIAL OF SERVICE ATTACKS DEFINITION (continued): …  kiddy, leaves no clues as to who is making the exploit, making the identity of a packet monkey more difficult to trace. In addition, a denial-of-service attack can be launched on a wider scale than attacks performed by script kiddies, making them more difficult to investigate. Hackers look down on packet monkeys and often describe them as "bottom feeders." Because a packet monkey uses tools created by others, the packet monkey has little understanding of the harm that may be caused. Typically, packet monkey exploits are random and without any purpose other than the thrill of making an effect. … 
Denial of Service Attacks definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement