Search Details

Word: dos (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...dangerous than soda and cookies in a San Jose, Calif., hotel lobby. Like hundreds of techies who help keep the backbone of the Internet properly aligned, Hannan had spent the morning at the North American Network Operators' Group conference listening to a talk on something called denial-of-service (DOS) attacks. "I thought I knew about them well enough," says Hannan. "I didn't pay much attention. I wish...

Author: /time Magazine | Title: Behind The Hack Attack | 2/21/2000 | See Source »

Hannan and his team zipped back to Global Crossing's HQ. In an hour they figured out they were under a DOS attack. It took another couple hours of monitoring their $500,000 routing machines to figure out which one was being attacked and to install the kind of filters that would scare the phantoms away. It wasn't brain surgery. Kids make DOS attacks all the time. But when the engineers saw the size of the barrage--10 times as large as anything ever recorded--they gasped. "We all agreed," says Hannan, "that we had a very formidable opponent...

Author: /time Magazine | Title: Behind The Hack Attack | 2/21/2000 | See Source »

...going to brag about it? Some saw an economic motive or a Quixotic tilt at the commercialization of the Internet. After all, our phantom had managed to interrupt one of Wall Street's sacred rituals: the dotcom IPO of Buy.com which was hit by a DOS attack on Tuesday afternoon, before the end of its first day as a publicly traded company. The stock had reached a peak of $30.25, then closed at an unspectacular $25.12. Just when Buy.com chief executive Gregory Hawkins should have been popping champagne corks, he was hunkering down in an emergency session with his techies...

Author: /time Magazine | Title: Behind The Hack Attack | 2/21/2000 | See Source »

...were used for the Yahoo attack; more were employed in later hits. But once they were selected, activation was simply a matter of uploading bits of code called daemons, similar to viruses, which bided their time in dark corners of these remote networks until the hacker decided it was DOS Day. The attacks appeared to come from them, not him (attacks from multiple sites are hard to pin down in any case). When the "master" activates his daemons, his hands remain unseen. Technically, "the Amazons and Yahoos were not hacked into," notes Simon Perry of security software firm Computer Associates...

Author: /time Magazine | Title: Behind The Hack Attack | 2/21/2000 | See Source »

Case in point: John Vranesevich, founder of hacker-watch website AntiOnline.com seen by many hackers as something of a Benedict Arnold. So loathed is he that AntiOnline is an almost constant target for DOS attacks (in one of its more entertaining features, the site lets you see who's attacking it, and how, in real time). While the Feds were still holding press conferences, AntiOnline had already compiled a perp-profile sheet. The attacks, it says, were committed by a cell of three to six hackers--most likely teenagers, most likely male. "All DOS attacks have been perpetrated by more...

Author: /time Magazine | Title: Behind The Hack Attack | 2/21/2000 | See Source »

Previous | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | Next