• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • About
  • Contact
  • Subscribe
  • Advertise
methodshop

methodshop

tech news, reviews & how to's

  • Trending
  • Latest
  • Tech
    • Apps
    • Internet
    • Software
    • Security
    • Games
    • Advertising
  • Life
    • Entertainment
    • TV & Film
    • Music
    • Health & Science
    • Family
    • Social Media
    • Food
    • Style
  • Learn
    • Tutorials
    • Reviews
    • News
      • Business
      • Crime
      • Politics
  • Fun
    • Featured
    • Humor
    • Holiday

Home : Security : Behind-The-Scenes Protectors Foil Internet Hacker Attack

Hacker Anonymous
Michael Treu

Behind-The-Scenes Protectors Foil Internet Hacker Attack

February 8, 2007 by jayfrankwilson
FacebookTweetPinLinkedIn

A hacker attack on the Internet failed this week — but experts warn there could be more to come.

Three of the 13 computers that help direct all Internet traffic were hit with a flood of data requests Tuesday. Although it’s not yet clear where the torrent came from, it was most likely designed to overwhelm the computers, says Peter Reiher, a professor at UCLA’s engineering school.

Hackers commonly use this approach, called a denial of service attack (DOS), to cause computers to slow down or crash.

What Would Have Happened If The Internet Hacker Attack Was Successful?

If the Internet hacker attack had been successful, web traffic might have slowed to a crawl. But the technical groups that quietly run the Internet behind the scenes have built a system designed to reroute traffic during an attack. It appeared to have worked, since few users noticed any slowdown, says Edward Naughton, a Boston-based lawyer at Holland & Knight who specializes in Internet issues.

“It’s an indication that the system is well designed,” he says.

But that does not mean it is foolproof, says Avi Silberschatz, head of Yale‘s computer science department. In a worst-case scenario, the attack may have been a small-scale assault designed to test the vulnerability of the system, he says. The unknown hackers “may be thinking about something big,” he says. On the other hand, “It may have just been kids,” he says.

Behind-The-Scenes Protectors Foil Internet Hacker Attack - Programmer Woman Glasses 1
Studying hacker code

Hackers launch denial of service attacks by taking over thousands of everyday PCs that don’t have adequate anti-virus and other protections installed. Then they redirect all that computing power toward the targeted computer. It’s not difficult for someone with midlevel computer knowledge to do, Reiher says. That’s one reason denial of service attacks are so dangerous.

Who Is In Charge Of The Internet’s Safety?

No one organization is in charge of keeping the Internet safe and running smoothly.

A hodgepodge of technical groups runs the Net behind the scenes in partnership with governments and corporations. This arrangement is not without controversy. Several key governance groups, including the Marina del Rey, Calif.-based Internet Corp. for Assigned Names and Numbers, have ties to the U.S. government. The relationships are linked to the Internet’s roots as a Defense Department-funded university research project.

At a United Nations conference in October, many other countries called for more worldwide involvement in Internet governance. So did Yoshio Utsumi, a U.N. telecommunications official.

But this week’s unsuccessful attack is an indication that the current administration is keeping the Internet working well, Naughton says. “We weren’t just lucky,” he says.

Car Hacking

Now That All New Cars Have Computers, Car Hacking Is Easier Than Ever And The Auto Industry Is Utterly Unprepared

Read moreNow That All New Cars Have Computers, Car Hacking Is Easier Than Ever And The Auto Industry Is Utterly Unprepared
Tips On How To Easily Manage Online Passwords

7 Tips On How To Manage Online Passwords And Keep Your Data Safe From Hackers

Read more7 Tips On How To Manage Online Passwords And Keep Your Data Safe From Hackers
Usb Data Blockers Can Prevent Hackers From Juice Jacking Your Smartphone While It Charges

The 6 Best USB Data Blockers To Prevent Hackers From Juice Jacking Your Files

Read moreThe 6 Best USB Data Blockers To Prevent Hackers From Juice Jacking Your Files
Behind-The-Scenes Protectors Foil Internet Hacker Attack - Clear Feature 2

Is A CLEAR Airport Security Membership Worth The Money?

Read moreIs A CLEAR Airport Security Membership Worth The Money?
Angry Woman - Credit Card Scam Victim

How A Credit Card Scam Works: Unraveling The 5 Stages Of This Confidence Trick

Read moreHow A Credit Card Scam Works: Unraveling The 5 Stages Of This Confidence Trick
Funny Wifi Network Names

101 Funny WiFi Network Names To Harass And Entertain Your Neighbors

Read more101 Funny WiFi Network Names To Harass And Entertain Your Neighbors


FacebookTweetPinLinkedIn
Category: Security, Crime, Internet, News Tag: Hacks
Previous Post:Law & Order SVU Valentine’s Day Cards
Next Post:New York City Politician Carl Kruger Proposes An iPod Crosswalk Ban (2007)New York City iPod Crosswalk Ban

Sidebar

Popular Posts

  • Job Automation Using ChatGPT Could Make These Jobs Obsolete - Is Your Job On This List?Job Automation Using ChatGPT Could Make These Jobs Obsolete – Is Your Job On…
  • 7 Pictures Of Naked People Captured By Google's Cameras7 Pictures Of Naked People Captured By Google’s Cameras
  • The Surprising Story Behind The NBC ChimesThe Surprising Story Behind The NBC Chimes
  • Top 200 Nielsen DMA Rankings (2023) – Full ListTop 200 Nielsen DMA Rankings (2023) – Full List
  • How To Change The Default LG TV Home Screen To Live TVHow To Change The Default LG TV Home Screen To Live TV
  • 5 Funny Resurrection Jokes To Share On Easter Sunday5 Funny Resurrection Jokes To Share On Easter Sunday
  • 20 Famous People Who Are Members Of The Sleepless Elite20 Famous People Who Are Members Of The Sleepless Elite
  • Controversial Nimbus 2000 Vibrating Harry Potter Broomstick Has Parents In An UproarControversial Nimbus 2000 Vibrating Harry Potter Broomstick Has Parents In An Uproar
  • 30 Dirty Irish Pick Up Lines That Will Probably Get You Slapped30 Dirty Irish Pick Up Lines That Will Probably Get You Slapped
  • The Best Caddyshack Quotes: 30 Famous Caddyshack Quotes That'll Make You LaughThe Best Caddyshack Quotes: 30 Famous Caddyshack Quotes That’ll Make You Laugh

Categories

Ask Alexa St. Patrick's Day - Funny St. Patrick's Day Jokes & Irish Jokes

10 Fun Things To Ask Alexa On St. Patrick’s Day

Amazon’s Alexa can be a fun and helpful part of your St. Patrick’s Day celebrations and activities. Here are some fun Irish and St. Patrick’s Day related things to #AskAlexa.

How To Visually Identify AI-Generated Text

How To Manually Identify AI-Generated Text Without Using A ChatGPT Detector

Wondering if what you’ve read is bot or human-generated? AI text detectors can help, but can be time-consuming. Here’s how humans can train to identify AI-generated text.

Recent Posts

  • How To Manually Identify AI-Generated Text Without Using A ChatGPT Detector
  • 10 Clever Tech Gifts That People Actually Want
  • 10 Fun Things To Ask Alexa On St. Patrick’s Day
  • 30 Dirty Irish Pick Up Lines That Will Probably Get You Slapped
  • Why Chuck E. Cheese Is Still Using Floppy Disks To Make Its Rodent Mascot Dance

Jump to comments

About

MethodShop’s mission is to entertain, inform, and sometimes gross you out. MethodShop has affiliate relationships, so we may get a small share of the revenue from your purchases. Items are sold by the retailer, not by us. All prices are subject to change.

Latest

How To Visually Identify AI-Generated Text

How To Manually Identify AI-Generated Text Without Using A ChatGPT Detector

Clever Tech Gifts

10 Clever Tech Gifts That People Actually Want

Follow

  • Facebook
  • Twitter
  • Instagram
  • YouTube
  • Pinterest
MethodShop Animated Zoom Icon
  • About
  • Submit
  • Disclaimer
  • Privacy Policy
  • Contact
  • Subscribe
  • Store

Copyright © 2023 MethodShop · All Rights Reserved