<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: How to Protect Your Network against DDoS Attacks</title>
	<atom:link href="http://www.gfi.com/blog/how-to-protect-your-network-against-ddos-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/how-to-protect-your-network-against-ddos-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-protect-your-network-against-ddos-attacks</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Andrew Phert</title>
		<link>http://www.gfi.com/blog/how-to-protect-your-network-against-ddos-attacks/comment-page-1/#comment-31696</link>
		<dc:creator>Andrew Phert</dc:creator>
		<pubDate>Wed, 29 Feb 2012 05:07:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8189#comment-31696</guid>
		<description><![CDATA[For a more detailed overview of how DDoS attack works, we can categorize its system into three main components: Master, Slave, and Target. 

The first and the most sinister of them all is the Master. This is the overall in-charge of the attack. It is also the main source of all codes and programs. They&#039;re the root. The second part is the Slave. It is composed of the infected computer units, workstations and network servers. They&#039;re the bridge used to connect the Master and its target. The last component is the Target. By the name itself, it&#039;s the target of the Master. This is where all command attacks are executed.]]></description>
		<content:encoded><![CDATA[<p>For a more detailed overview of how DDoS attack works, we can categorize its system into three main components: Master, Slave, and Target. </p>
<p>The first and the most sinister of them all is the Master. This is the overall in-charge of the attack. It is also the main source of all codes and programs. They&#8217;re the root. The second part is the Slave. It is composed of the infected computer units, workstations and network servers. They&#8217;re the bridge used to connect the Master and its target. The last component is the Target. By the name itself, it&#8217;s the target of the Master. This is where all command attacks are executed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Thomas Macadams</title>
		<link>http://www.gfi.com/blog/how-to-protect-your-network-against-ddos-attacks/comment-page-1/#comment-31668</link>
		<dc:creator>Thomas Macadams</dc:creator>
		<pubDate>Tue, 28 Feb 2012 02:23:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8189#comment-31668</guid>
		<description><![CDATA[Organizations and enterprises are now equipped with the latest anti-virus, anti-malware, and anti-spam programs . Hackers are now slowly staying away from these type of computers. The growing trend now is to DDOS attack personal computers at homes and public places (such as Internet cafes, coffee shops, libraries, etc). 

The hackers know that these computers are the least protected and the most accessed to. Moreover, users of these machines are not that knowledgeable enough about the threats of DDOS attack. Sometimes, they don&#039;t even logout while using Facebook or Yahoo Messenger. Some even enable the &quot;Remember Me&quot; option.]]></description>
		<content:encoded><![CDATA[<p>Organizations and enterprises are now equipped with the latest anti-virus, anti-malware, and anti-spam programs . Hackers are now slowly staying away from these type of computers. The growing trend now is to DDOS attack personal computers at homes and public places (such as Internet cafes, coffee shops, libraries, etc). </p>
<p>The hackers know that these computers are the least protected and the most accessed to. Moreover, users of these machines are not that knowledgeable enough about the threats of DDOS attack. Sometimes, they don&#8217;t even logout while using Facebook or Yahoo Messenger. Some even enable the &#8220;Remember Me&#8221; option.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Roger Willson</title>
		<link>http://www.gfi.com/blog/how-to-protect-your-network-against-ddos-attacks/comment-page-1/#comment-31660</link>
		<dc:creator>Roger Willson</dc:creator>
		<pubDate>Mon, 27 Feb 2012 08:21:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8189#comment-31660</guid>
		<description><![CDATA[Unfortunately, you can&#039;t defend yourself against a DDoS carried by an organized group of hackers. When the requests are coming from multiple IPs, your best bet is to shut some of them at random. You can look for the IPs with the most requests but usually by the time you have found them, new IPs take over. It is hard to admit but actually you are at the mercy of hackers and of your ISP, especially if their capacity isn&#039;t huge.]]></description>
		<content:encoded><![CDATA[<p>Unfortunately, you can&#8217;t defend yourself against a DDoS carried by an organized group of hackers. When the requests are coming from multiple IPs, your best bet is to shut some of them at random. You can look for the IPs with the most requests but usually by the time you have found them, new IPs take over. It is hard to admit but actually you are at the mercy of hackers and of your ISP, especially if their capacity isn&#8217;t huge.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Xerxes Cumming</title>
		<link>http://www.gfi.com/blog/how-to-protect-your-network-against-ddos-attacks/comment-page-1/#comment-31646</link>
		<dc:creator>Xerxes Cumming</dc:creator>
		<pubDate>Sat, 25 Feb 2012 16:43:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8189#comment-31646</guid>
		<description><![CDATA[Having to tackle the intrusion detection system (IDS) is too complicated for the average user. I know DDOS attack protection is the job of the network admin, however ordinary users should also be involved.

Protect your email server and email account and you&#039;ll also be protected against DDOS attacks. Not all people know this but one of the several tell-tale signs that your system or network has been attacked is that the amount of junk mail you received every day has increased three to five times the normal. The more spam messages in your outbox or junk folder, the higher the probability that your systems was or is DDOS attacked.]]></description>
		<content:encoded><![CDATA[<p>Having to tackle the intrusion detection system (IDS) is too complicated for the average user. I know DDOS attack protection is the job of the network admin, however ordinary users should also be involved.</p>
<p>Protect your email server and email account and you&#8217;ll also be protected against DDOS attacks. Not all people know this but one of the several tell-tale signs that your system or network has been attacked is that the amount of junk mail you received every day has increased three to five times the normal. The more spam messages in your outbox or junk folder, the higher the probability that your systems was or is DDOS attacked.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Adam Loveland</title>
		<link>http://www.gfi.com/blog/how-to-protect-your-network-against-ddos-attacks/comment-page-1/#comment-31643</link>
		<dc:creator>Adam Loveland</dc:creator>
		<pubDate>Sat, 25 Feb 2012 12:28:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=8189#comment-31643</guid>
		<description><![CDATA[I think most companies and organizations don&#039;t even consider the possibility of defending DDoS, and are more apt to fuel their resources into their plan as to what to do once it&#039;s already happening. Of course, that&#039;s like eschewing locks on your doors in exchange for a gun in case anybody decides to let themselves in. Not the smartest idea, but because of the complexity and theoreticals of being preventive, it&#039;s the only choice many have.]]></description>
		<content:encoded><![CDATA[<p>I think most companies and organizations don&#8217;t even consider the possibility of defending DDoS, and are more apt to fuel their resources into their plan as to what to do once it&#8217;s already happening. Of course, that&#8217;s like eschewing locks on your doors in exchange for a gun in case anybody decides to let themselves in. Not the smartest idea, but because of the complexity and theoreticals of being preventive, it&#8217;s the only choice many have.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 05:15:05 by W3 Total Cache --