Close Menu
    • Facebook
    • Twitter
    • Pinterest
    • WhatsApp
    Categories
    • Animals (118)
    • App Development (227)
    • Arts and Entertainment (216)
    • Automotive (362)
    • Beauty (91)
    • Biography (16)
    • Book Reviews (53)
    • Business (3,587)
    • Cancer (37)
    • Casino (15)
    • CBD (39)
    • celebrity (6)
    • Communications (96)
    • Computers and Technology (986)
    • Construction (101)
    • Digital Marketing (680)
    • Education (576)
    • Events (25)
    • Farmest (12)
    • Fashion (506)
    • Featured (131)
    • Finance (420)
    • Food and Drink (265)
    • Gadgets (149)
    • Gaming (266)
    • Graphic Designing (61)
    • Guide (327)
    • Health and Fitness (2,029)
    • Home and Family (319)
    • Home Based Business (126)
    • Home Improvement (922)
    • Insurance (64)
    • Internet and Businesses Online (329)
    • Investing (67)
    • Kids and Teens (108)
    • Legal (298)
    • Lifestyle (12)
    • Lifestyle (642)
    • Medical (312)
    • Movies (20)
    • News (228)
    • Photography (52)
    • Products (455)
    • Real Estate (332)
    • Recreation and Sports (43)
    • Reference and Education (128)
    • Relationships (85)
    • Reviews (6)
    • Self Improvement (73)
    • SEO (346)
    • Services (1,115)
    • social media (1)
    • Software (440)
    • Sports (63)
    • Study (53)
    • Travel and Leisure (570)
    • TV (42)
    • Uncategorized (639)
    • Video (34)
    • Women's Interests (138)
    • Writing and Speaking (90)
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    The Post City
    • Home
    • Business
    • Health and Fitness
    • News
    • Finance
    • Contact Us
    The Post City
    Home»Computers and Technology»What is DDos attack? Why is the DDOS attack done?
    Computers and Technology

    What is DDos attack? Why is the DDOS attack done?

    The Post CityBy The Post CityAugust 16, 2020No Comments5 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn WhatsApp Pinterest Email

    Has it ever occurred to you that you want to access a website but the website is not loading? At such times you may have searched for another website to see if your internet is working properly and it is working properly. You may get annoyed with the website for not being able to access the website or for slow loading. But you know what? This could be a hacker attack, which is one of the reasons why the server engineers of that website are deprived of a good night’s sleep.

    This type of attack is called a DDoS attack. Even if you are not a hacker, your computer may be used unknowingly for this type of attack. Are you surprised? Surprisingly, this is true. So let’s take a look at the details of this type of attack.

    About DDoS Attack:

    Any type of website is stored on a server at one end of the world or in more than one place. The server limits some resources such as CPU, memory, etc. for that website. When you send a request to access the website, the server processes your request and provides you with the information you need.

    Since the resources for websites are limited, a website or server can only serve a certain number of users at a given time. With more user requests, the website gradually slows down for everyone. Now if a person or organization sends a request from multiple computers to a server for the purpose of slowing down or shutting down the service then it is called DDoS attack.

    Why DDoS attack is done?

    Suppose, You sleep in your bed at night. Even if you press on that bed, you can’t sleep more than 3 people. If 4 or 5 people try to sleep there. Then there will be problems. This is how every web site has a capacity. How many visitors can access that web site at the same time or in one day? But if you catch as many visitors in 1 hour. If it comes in 1 minute or less, then think about it.

    This type of attack can last from a few hours to a few days. Now the question remains why such attacks are carried out. Sometimes it is done by a competing company for financial reasons. Sometimes it is done for political reasons. Again, sometimes it’s just for the hacker’s pleasure.

    How do hackers do such attacks?

    The first thing you need to do to attack a DDoS is to have a large number of computers that will simultaneously send access requests to the website. Hackers use computers of ordinary people like you for this purpose. First, they create malware. In short, malware is a type of software that does something other than the purpose for which you install it. They spread this malware to various websites or mail attachments. 

    DDoS Attack is based on a type of computer called a zombie computer. Horror movie zombies are being talked about here. These computers are infected with any kind of Trojan or malware. In most cases, the user does not even know that his computer is infected with Trojan. The real attacker sends a request to all these Trojans, with instructions on where to attack and when or for how long. As soon as the request is received, these zombies start attacking the computer. The more Trojan infected computers, the higher the level of attack. When thousands of innocent computers are sending thousands of megabits of traffic to a server, it is only natural that the condition of any server will deteriorate.

    Malware Infection:

    Whenever you open such a website or mail, this malware is installed on your computer without your knowledge. Then, your computer also joins the robot army of hackers. This type of malware-infected computer network is called a botnet. The computers on these botnets are waiting for the hackers to signal when to attack. Sometimes the malware itself gives all the information on the target website. The attack starts as soon as the time starts, once the server goes down due to being slow.

    I hope you get some ideas about the DDoS attack from this article. In the next article, I will discuss how to prevent DDoS attacks.

    Sharewebhost is a web hosting service company in Bangladesh providing the best web hosting services with highly secure data centers and DDoS protected servers. If you want to manage your website and business properly then sharewebhost can be your solution.

    In fact, a DDoS attack is a very common attack that is more or less the same for all websites. It’s just a process of making your website unusable for a while. Maybe the hacker has any enmity with you or for some political reason or just does it for his pleasure. Most hosting providers offer DDoS protected servers. So if you take hosting service from a good provider then maybe this problem can be solved a lot. In addition, we will show more ways of DDoS protection in the next article.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    The Post City

    Related Posts

    The Impact of Generative AI for Manufacturing

    June 3, 2025

    The Role of Disability Employment Services in Achieving Equal Employment Opportunities

    April 7, 2025

    Wood Stove Heating Efficiency: “How to Get the Most Heat at Home”

    February 12, 2025

    The Importance of Hardware Design in Modern Technology

    January 25, 2025

    Music in the Digital World: The Impact of Blockchain Technology in the Music Industry

    November 26, 2024

    How to Find the Best Airbnb Cleaning Service

    October 28, 2024
    Add A Comment

    Comments are closed.

    Our Picks

    Why Retro Games Are Making a Big Comeback in 2025

    June 17, 2025

    Getting Started with Online Gaming: The Importance of a Smooth Registration Process

    June 12, 2025

    Why SHR Is the Hair Removal Upgrade Your Skin Has Been Waiting For

    June 12, 2025

    How AI Agents Are Transforming Digital Operations

    June 12, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Categories
    • Animals (118)
    • App Development (227)
    • Arts and Entertainment (216)
    • Automotive (362)
    • Beauty (91)
    • Biography (16)
    • Book Reviews (53)
    • Business (3,587)
    • Cancer (37)
    • Casino (15)
    • CBD (39)
    • celebrity (6)
    • Communications (96)
    • Computers and Technology (986)
    • Construction (101)
    • Digital Marketing (680)
    • Education (576)
    • Events (25)
    • Farmest (12)
    • Fashion (506)
    • Featured (131)
    • Finance (420)
    • Food and Drink (265)
    • Gadgets (149)
    • Gaming (266)
    • Graphic Designing (61)
    • Guide (327)
    • Health and Fitness (2,029)
    • Home and Family (319)
    • Home Based Business (126)
    • Home Improvement (922)
    • Insurance (64)
    • Internet and Businesses Online (329)
    • Investing (67)
    • Kids and Teens (108)
    • Legal (298)
    • Lifestyle (12)
    • Lifestyle (642)
    • Medical (312)
    • Movies (20)
    • News (228)
    • Photography (52)
    • Products (455)
    • Real Estate (332)
    • Recreation and Sports (43)
    • Reference and Education (128)
    • Relationships (85)
    • Reviews (6)
    • Self Improvement (73)
    • SEO (346)
    • Services (1,115)
    • social media (1)
    • Software (440)
    • Sports (63)
    • Study (53)
    • Travel and Leisure (570)
    • TV (42)
    • Uncategorized (639)
    • Video (34)
    • Women's Interests (138)
    • Writing and Speaking (90)
    Facebook X (Twitter) Pinterest WhatsApp
    • Home
    • Lifestyle
    • Buy Now
    © 2025 The Posts City

    Type above and press Enter to search. Press Esc to cancel.