Daily Tips Ndtricks

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 19 June 2013

5 Strategies To Fight Anonymous DDoS Attacks

Posted on 09:38 by Unknown

How To Prevent DDoS Attacks?
Img.Credit:chanpipat
There are lots of ways to protect your site against spammers and other folks who generally do not do nice things online. You are not safe online, and you should remember it all the time. However, if you can protect yourself against spammers, often you’re helpless when your site is under DDoS attack. By the way, do not feel guilty for not being able to protect it. Such companies as eBay or the US government sites used to be victims of hackers and they were also helpless for some time, although they had enough money and resources to hire the best engineers to deal with the attacks.

Of course, you have to bear in mind that DDoS attacks can be so big and intense that you will need much resources to stop them. If 200k computers are trying to connect to your site all at once, there is no hardware and software that can handle it. Yet, there are a few little secrets that will help you fight anonymous DDoS attacks.

1.) There are no invulnerable sites:

In fact, if you think that only government sites are hit by Anonymous group, you are mistaken. Sure, they target mostly government sites of countries they don’t like. However, recently sites of New Zealand government were hit. Can you say anything controversial about New Zealand? So, your site might well be a target for such attacks. Be prepared for the worst.

2.) DDoS attacks are better to stop at the initial stages:

As a rule, site owners do not do much at first. They just wait for the site to go down and then start complaining. What you should do is to implement the best practices in the industry to protect your site, network, any additional services, such as DNS. Don’t wait until hackers destroy your site.

3.) Identify the bottleneck of the attack:

There should be a part of your network which is most vulnerable. Hackers use it to assault your site. These weak areas may include a firewall, a server, an Internet pipeline, a security system, a load balancer or a SQL server. Any of these elements of your network can be vulnerable to attacks. So, identification of where the attack comes from will certainly help you ‘stand and fight’. Some experts recommend slowhttptest tool to stop DDoS attacks. You can also configure your server to allow only 1k requests at once.

4.) Monitor your network:

Yes, you have to see what’s happening in your network, especially if your site is a part of a large corporate network. Sometimes, you may just block your network to be access from the Internet and analyze the attack. Sure, this is not the best solution, but this will give you a few extra hours to handle the attack.

5.) Cooperate with your ISP and a hosting company:

Yes, this is the best decision to make. Call your ISP, and make sure they are aware of the problem. Reliable ISPs and hosting providers have enough resources to deal with DDoS attacks, of course, if they are not too big. It is fair to say that if your site has become a target for Anonymous you will have problems.




Author Bio:
Aleksey is an independent consultant in matters of the Internet security and data protection. He personally oversees a dozen of sites for small and mid sized companies, as well as cooperates with such services as http://www.vistnet.com.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Blogging Tips, Security Tips, tips | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Being Smart For Used Smartphones
    On seeing our article on " Interesting Facts About Smartphone " You might be dying to have a Smartphone, it’s in, it’s cool, it’...
  • Protect Your Business Information: Data Security Guidelines
    We live in a digital era and there are not only traditional hazards that endanger our business. Cyber attacks are becoming more and more co...
  • Invisible Yahoo Detector
    Invisible detect users on Yahoo! Messenger (YM)         Use our Invisible Yahoo Scanner to detect if a Yahoo Messenger users is in fact offl...
  • 5 Reasons To Use A Website Builder
    If you don’t have a personal website, but you’re dreaming about launching one, you’ve come to the right place. In this article I’m going to...
  • Tips and Tricks about Online Bargains
    The internet, with the myriads of interconnected computers and sites, its not impossible that there is something good waiting to be discover...
  • Pros And Cons Of IPhones
    Img. Credit:  freedigitalphotos There is a great deal of buzz in the smart phone arena as of late. With the HTC Droid DNA and the upcoming ...

Categories

  • android apps
  • apps
  • blogging
  • Blogging How To
  • Blogging Tips
  • Blogging Tools
  • business
  • Buying Guide
  • Cloud Computing
  • Computer Tips
  • Computer tricks
  • domain
  • Downloads
  • Earn Online
  • Facebook
  • Facebook Tricks
  • freewares
  • gadgets
  • games
  • Gaming
  • Gaming Tips
  • Gaming Tools
  • Google Glass
  • how to
  • Infographics
  • iphone
  • iphone apps
  • Mobile Tips
  • Mobile Tricks
  • Online Tips
  • Online Tricks
  • Other Tricks
  • printers
  • QR Code
  • recycle
  • review
  • Security Tips
  • seo
  • social media
  • softwares
  • Tech
  • tips
  • Tips -Computer Tips
  • tricks
  • Useful Tools
  • Web host
  • website
  • wet mobile
  • windows phone 8
  • youtube

Blog Archive

  • ▼  2013 (331)
    • ►  December (3)
    • ►  November (11)
    • ►  October (23)
    • ►  September (27)
    • ►  August (26)
    • ►  July (25)
    • ▼  June (36)
      • Slow Computer? Learn How to Speed Up Your PC
      • Interesting Facts That You Didn't Know About Your ...
      • Google Glass - The Future Of Eyewear
      • How On Earth Can I Download A Youtube Video?
      • Are You Using The Internet Efficiently Time-Wise?
      • 3 Apps Every Parent Needs
      • Hacking And Cracking: What's The Difference?
      • Top iPhone Apps for Parents
      • Review On Bitdefender Internet Security 2013
      • Secure Password Generator
      • QR Code Generator
      • 5 Strategies To Fight Anonymous DDoS Attacks
      • Social Media - Great Way of Communication
      • Top 5 Investment Apps
      • The Emergence & Efficiency of LinkedIn
      • IT Rumors iPhone 6 Will Be The Low-Cost Phone
      • A Password Manager Ensures Safe Browsing Anywhere
      • iPhone Will Feature The Long-Rumored Fingerprint S...
      • How to Find a Reliable Web Hosting Partner [Infogr...
      • Best iPhone Apps For Photo Editing in 2013
      • Truth Behind Unlimited Hosting [Infographic]
      • Teach Your Mother To Type With These 5 Apps
      • 6 White Hat SEO Tactics
      • Making Money With YouTube
      • 6 Online Tools To Enhance Your Jobsearch
      • Online Hangouts Worldwide [Infographic]
      • Top Security Applications For The IPhone
      • Finding The Perfect Computer To Fit Your Needs
      • Super Smartphone Apps For Drivers
      • Attributes Of A Great Web Browser For Students
      • Reasons You Would Need To Convert Wma To Mp3
      • How Apple is Ruling the World? [Infographic]
      • Exactly How To Construct Your Own Computer On A Bu...
      • Why Do We Love YouTube So Much?
      • How To Use Technology To Get The Right Job?
      • How to Attract More Visitors to Your Blog
    • ►  May (56)
    • ►  April (30)
    • ►  March (31)
    • ►  February (31)
    • ►  January (32)
  • ►  2012 (43)
    • ►  December (11)
    • ►  November (2)
    • ►  October (2)
    • ►  September (9)
    • ►  August (18)
    • ►  July (1)
Powered by Blogger.

About Me

Unknown
View my complete profile