Configuring the IITG Campus VPN
Introducing Cepstrum's new initiative "How To'" series to solve all your how to queries you face related to our campus! Here's the first one, "How To access IITG LAN?"
Introducing Cepstrum's new initiative "How To'" series to solve all your how to queries you face related to our campus! Here's the first one, "How To access IITG LAN?"
What we’ll attempt to do in this article is similar to testing a nuclear bomb (okay, not really). But still, there’s no way to tell exactly what will happen, other than to blast the damn thing because more often than not that’s just the way it is with DDOSing.
Most of us use Amazon, Facebook, and Gmail almost on an everyday basis but what if you get to know that even those platforms are not safe and secure in terms of personal data like password and other information it is a great threat for all of us.
While DDoS has historically been just an annoyance, there is usually a financial impact, such as lost sales or a spike in bandwidth costs.<<<
Now that we’ve got a good understanding on the what DDoS is, let’s take a look at how it’s practically done. Although I won’t get into the technical details, here is an example of a fairly popular DOS tool - HULK