About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 73. Chapters: Internet Relay Chat, Instant messaging, Internet Relay Chat takeover, Denial-of-service attack, Luser, BITNET Relay, Jarkko Oikarinen, .NET Messenger Service, Comparison of Internet Relay Chat clients, Comparison of Internet Relay Chat services, Comparison of Internet Relay Chat daemons, IRCd, List of Internet Relay Chat commands, Extensible Messaging and Presence Protocol, The Hamnet Players, Internet Relay Chat flood, Comparison of mobile Internet Relay Chat clients, File sharing, Direct Client-to-Client, Timeline of Internet conflicts, Skype protocol, MSN Chat, Eggdrop, ClueNet, Google Wave Federation Protocol, Yahoo! Messenger Protocol, Microsoft Notification Protocol, SILC, Internet Relay Chat subculture, Ident, OSCAR protocol, Comparison of Internet Relay Chat bots, Internet Relay Chat operator, Infobot, Netsplit, Jingle, XDCC, Acrophobia, Rob Levin, TOC protocol, Internet Relay Chat script, Zephyr, SIMPLE, BNC, Serving channel, 1dl, TOC2 protocol, Aaron Barr, Wireless Village, Anope, OMA Instant Messaging and Presence Service, IRCX, Pisg, Galago, Client-to-client protocol, IRC poker, Inter-server, Personal message, Wireless Framework Telecomunication, Invisible IRC Project, Flood control, Personal im, Presence and Instant Messaging, Instant Messaging and Presence Protocol, SendQ. Excerpt: A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers s...