enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Ping flood - Wikipedia

    en.wikipedia.org/wiki/Ping_flood

    A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP "echo request" packets. [1] This is most effective by using the ...

  3. Paping - Wikipedia

    en.wikipedia.org/wiki/Paping

    Paping (pronounced pah ping) is a computer network administration utility used to test the reachability of a host on an Internet Protocol (TCP/IP) network and to measure the time it takes to connect to a specified port. The name is a play on the word ping, another computer network administration utility.

  4. ping (networking utility) - Wikipedia

    en.wikipedia.org/wiki/Ping_(networking_utility)

    The command-line options of the ping utility and its output vary between the numerous implementations. Options may include the size of the payload, count of tests, limits for the number of network hops ( TTL ) that probes traverse, interval between the requests and time to wait for a response.

  5. Ping of death - Wikipedia

    en.wikipedia.org/wiki/Ping_of_death

    A ping of death is a type of attack on a computer system that involves sending a malformed or otherwise malicious ping to a computer. [1] In this attack, a host sends hundreds of ping requests with a packet size that is large or illegal to another host to try to take it offline or to keep it preoccupied responding with ICMP Echo replies.

  6. Internet Control Message Protocol - Wikipedia

    en.wikipedia.org/wiki/Internet_Control_Message...

    The traceroute command can be implemented by transmitting IP datagrams with specially set IP TTL header fields, and looking for ICMP time exceeded in transit and destination unreachable messages generated in response. The related ping utility is implemented using the ICMP echo request and echo reply messages.

  7. Packet loss - Wikipedia

    en.wikipedia.org/wiki/Packet_loss

    Tools such as ping, traceroute, MTR and PathPing use this protocol to provide a visual representation of the path packets are taking, and to measure packet loss at each hop. [ b ] Many routers have status pages or logs, where the owner can find the number or percentage of packets dropped over a particular period.

  8. Ping sweep - Wikipedia

    en.wikipedia.org/wiki/Ping_sweep

    In computing, a ping sweep is a method that can establish a range of IP addresses which map to live hosts. The classic tool used for ping sweeps is fping, [ 1 ] [ 2 ] [ 3 ] which traditionally was accompanied by gping to generate the list of hosts for large subnets, [ 4 ] although more recent versions of fping include that functionality. [ 1 ]

  9. Stateful firewall - Wikipedia

    en.wikipedia.org/wiki/Stateful_firewall

    A well-known example of this is the ping utility. [7] ICMP responses will be allowed back through the firewall. In some scenarios, UDP communication can use ICMP to provide information about the state of the session so ICMP responses related to a UDP session will also be allowed back through.