• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • About
  • Contact
  • Subscribe
  • Advertise
method logo sxs 280x96 wht

methodshop

tech news, reviews & how to's

  • Trending
  • Latest
  • Tech
    • Apps
    • Internet
    • Software
    • Security
    • Games
    • Advertising
  • Life
    • Entertainment
    • TV & Film
    • Music
    • Health & Science
    • Family
    • Social Media
    • Food
    • Style
  • Learn
    • Tutorials
    • Reviews
    • News
      • Business
      • Crime
      • Politics
  • Fun
    • Featured
    • Humor
    • Holiday
    • Random Articles

Home : Security : Behind-The-Scenes Protectors Foil Internet Hacker Attack

hacker anonymous
hacker anonymous

Behind-The-Scenes Protectors Foil Internet Hacker Attack

Feb 8, 2007 by J. Frank Wilson
FacebookTweetPinLinkedIn
Reading Time: 2 minutes

A hacker attack on the Internet failed this week — but experts warn there could be more to come.

Three of the 13 computers that help direct all Internet traffic were hit with a flood of data requests Tuesday. Although it’s not yet clear where the torrent came from, it was most likely designed to overwhelm the computers, says Peter Reiher, a professor at UCLA’s engineering school.

Hackers commonly use this approach, called a denial of service attack (DOS), to cause computers to slow down or crash.

What Would Have Happened If The Internet Hacker Attack Was Successful?

If the Internet hacker attack had been successful, web traffic might have slowed to a crawl. But the technical groups that quietly run the Internet behind the scenes have built a system designed to reroute traffic during an attack. It appeared to have worked, since few users noticed any slowdown, says Edward Naughton, a Boston-based lawyer at Holland & Knight who specializes in Internet issues.

“It’s an indication that the system is well designed,” he says.

But that does not mean it is foolproof, says Avi Silberschatz, head of Yale‘s computer science department. In a worst-case scenario, the attack may have been a small-scale assault designed to test the vulnerability of the system, he says. The unknown hackers “may be thinking about something big,” he says. On the other hand, “It may have just been kids,” he says.

Behind-The-Scenes Protectors Foil Internet Hacker Attack - Programmer Woman Glasses 1
Studying hacker code

Hackers launch denial of service attacks by taking over thousands of everyday PCs that don’t have adequate anti-virus and other protections installed. Then they redirect all that computing power toward the targeted computer. It’s not difficult for someone with midlevel computer knowledge to do, Reiher says. That’s one reason denial of service attacks are so dangerous.

Who Is In Charge Of The Internet’s Safety?

No one organization is in charge of keeping the Internet safe and running smoothly.

A hodgepodge of technical groups runs the Net behind the scenes in partnership with governments and corporations. This arrangement is not without controversy. Several key governance groups, including the Marina del Rey, Calif.-based Internet Corp. for Assigned Names and Numbers, have ties to the U.S. government. The relationships are linked to the Internet’s roots as a Defense Department-funded university research project.





At a United Nations conference in October, many other countries called for more worldwide involvement in Internet governance. So did Yoshio Utsumi, a U.N. telecommunications official.

But this week’s unsuccessful attack is an indication that the current administration is keeping the Internet working well, Naughton says. “We weren’t just lucky,” he says.

A Hacker Looking At His Computer Screens

How Did My Name Get On Fast People Search?

Read moreHow Did My Name Get On Fast People Search?
Tutorial On How To Remove Your Info From Fastpeoplesearch

How To Remove Your Info From FastPeopleSearch

Read moreHow To Remove Your Info From FastPeopleSearch
Usb Data Blockers

The 6 Best USB Data Blockers To Prevent Hackers From Juice Jacking Your Files

Read moreThe 6 Best USB Data Blockers To Prevent Hackers From Juice Jacking Your Files
Car Hacked Scaled

Now That All New Cars Have Computers, Car Hacking Is Easier Than Ever And The Auto Industry Is Utterly Unprepared

Read moreNow That All New Cars Have Computers, Car Hacking Is Easier Than Ever And The Auto Industry Is Utterly Unprepared
Strong Online Passwords

7 Tips On How To Manage Online Passwords And Keep Your Data Safe From Hackers

Read more7 Tips On How To Manage Online Passwords And Keep Your Data Safe From Hackers
Clear Feature

Is A CLEAR Airport Security Membership Worth The Money?

Read moreIs A CLEAR Airport Security Membership Worth The Money?
J. Frank Wilson
J. Frank Wilson

Frank Wilson is a retired teacher with over 30 years of combined experience in the education, small business technology, and real estate business. He now blogs as a hobby and spends most days tinkering with old computers. Wilson is passionate about tech, enjoys fishing, and loves drinking beer.


FacebookTweetPinLinkedIn
Category: Security, Crime, Internet, News Tag: Hacks
Previous Post:lawordersvu valentines bigLaw & Order SVU Valentine’s Day Cards
Next Post:New York City Politician Carl Kruger Proposes An iPod Crosswalk Ban (2007)ipod crosswalk feature

Sidebar

Popular Posts

google naked

7 Pictures Of Naked People Captured By Google’s Cameras

rooftop woman

10 Naked Sunbathers Busted By Google Earth

lg tv disable home screen scaled

How To Change The Default LG TV Home Screen To Live TV

new york city skyline

The 21 Best Live Streaming New York City Webcams

hatch restore sleep

Is Your Hatch Restore Already Registered? Here’s How To Fix It And Unregister A Hatch Restore.

A mom laughing at a smartphone and tablet

250+ Funny Dirty Mom Jokes That Will Make Everyone Laugh (Even Mom)! (NSFW)

harrypotter sex

Controversial Nimbus 2000 Vibrating Harry Potter Broomstick Has Parents In An Uproar

usb data blockers

The 6 Best USB Data Blockers To Prevent Hackers From Juice Jacking Your Files

Britain’s Sycamore Gap Tree Deliberately Chopped Down in Act of Vandalism

Britain’s Sycamore Gap Tree Deliberately Chopped Down in Act of Vandalism

Caddyshack Quotes

35 Famous Caddyshack Quotes That’ll Make You Laugh

Jump to comments

About

MethodShop’s mission is to entertain, inform, and sometimes gross you out. MethodShop has affiliate relationships, so we may get a small share of the revenue from your purchases. Items are sold by the retailer, not by us. All prices are subject to change.

Follow

  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • Pinterest

Trending Posts

google naked

7 Pictures Of Naked People Captured By Google’s Cameras

rooftop woman

10 Naked Sunbathers Busted By Google Earth

lg tv disable home screen scaled

How To Change The Default LG TV Home Screen To Live TV

Latest Posts

U2 Sphere - A visually stunning concert with U2 performing inside a large glowing ball.

U2 Opens the Sphere in Las Vegas With a Visually Stunning Concert

Famous Gone With The Wind quotes

Frankly, My Dear, You Should ‘Give A Damn’ About These 15 Famous Gone With The Wind Quotes

Britain’s Sycamore Gap Tree Deliberately Chopped Down in Act of Vandalism

Britain’s Sycamore Gap Tree Deliberately Chopped Down in Act of Vandalism

MethodShop Animated Zoom Icon
  • About
  • Submit
  • Disclaimer
  • Privacy Policy
  • Contact
  • Subscribe
  • Store

Copyright © 2023 MethodShop · All Rights Reserved.