473,378 Members | 1,417 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,378 software developers and data experts.

Deny of Service (DOS) attack prevention

Hi all,

We know we can set up some propert firewall to do this job.

But from application's side, what do you think we can do to prevent this
type of attack?

--
Regards
Hardy
Jul 12 '07 #1
0 1412

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: Juan Manuel Alegrķa B. | last post by:
Hi group I have been making a windows service to execute an external application. I use a timer control, I can execute the application but does't appear as a normal windows, just I see it in the...
17
by: Carramba | last post by:
Hi! How u can declare(?) own window size when someone starts u program? I mean if I have some application and I want it to have a minimum window size, how do I do it? thanx in advance --...
4
by: \Rob\ | last post by:
On a domain controller, the ASPNET (v1.1) worker process (aspnet.wp.exe) runs under the IWAM_machinename acount (IIS 5). I have expressly denied this user the logon locally right in the domain...
6
by: Peter O'Reilly | last post by:
The news of Nick Berg is shocking enough. Having his video released and made widely available, in its _totality, including the decapitation, makes those web site operators accomplices in this...
5
by: =?Utf-8?B?cnZhbmdlbGRyb3A=?= | last post by:
Hello, I have a problem with our OnlineBackupService.exe. This is a Windows Service which is built in .Net 1.1 and basically grabs files from the file system and will try to upload them using...
1
by: TechnoAtif | last post by:
Could not start the mysql service on localcomputer Error 1067:The process terminated unexpectedly. ------------------------------------------------------------------------------ Hi All. I 'm...
6
by: K. | last post by:
Hello all! Can you write me some code which let me sleep calm during the night and what should I do to prevent some attackers from using curl function? In Poland there is a big portal which...
4
by: sakthikumarb | last post by:
Hi, There is any wmi event for deniel of service attack.if not,there is any other procedure to get a event for Denial of Service attack . Thanks in advance, Regards, Sakthi
15
by: learner247 | last post by:
Hi, I am learning csharp and have a question: My question is about handling a receiving socket. I use the backgroundworker class for multithreading. In the doWork event there is a while...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.