|WikiProject Computing / Networking||(Rated Stub-class, Low-importance)|
Attacker on a T1 line and victim on a dial-up modem seems a bit too disproportionate.... 22.214.171.124 16:41, 23 November 2006 (UTC)
- -Updated to DSL and Dial-Up --126.96.36.199 20:43, 25 May 2007 (UTC)
Batch file description
Should we really tell people how a ping flood attack batch file looks like? Won't that encourage people to send this type of cyberattack? —Preceding unsigned comment added by 188.8.131.52 (talk) 12:59, 4 November 2008 (UTC)
- Since those most likely to need us to write the batch file for them are possibly still on dial-up, or at least not on a very fat pipe, we probably could have one without increasing the number of successful attacks. On the other hand, this is an encyclopedia, not a how-to. I'm just going to wipe the section instead of leaving an ugly asdjnajdkgbl thing there. 184.108.40.206 (talk) 02:37, 27 February 2009 (UTC)
Print reference needed
If this subject is written about in a computer book, a reference to it would be nice. im not an expert, but i could not find any decent online references, oddly enough.Mercurywoodrose (talk) 18:30, 22 August 2009 (UTC)
Not always an attack?
Isn't a ping flood a valid (though questionably useful) diagnostic tool when used in short durations? Unix-derived OSes contain the ping -f option which makes it literally that simple (as long as you have su privileges) to start sending the "flood". If ABUSED it's an "attack", but need every use of the command be automatically given that label? I don't personally believe so.
Some reference may also be wanted as to the fact that *nix systems allow the ping -f command but the Windows ping utility includes no such function. — Preceding unsigned comment added by 220.127.116.11 (talk) 17:41, 1 September 2011 (UTC)
On WIndows it is a dumb looper: Entry point, ping command, redirect to entry point. VERY simply done - and it could be part of DDoS attacks. @echo off&:1&ping 192.168.1.1&goto 1 - expressed in one line.
Not an attack!
Ping flood is not an attack!
I use ping flood every day to somehow simulate more traffic than simple ping does make. That makes it a quick way to approximate packet loss on wifi for example. So it's actually pretty handy tool. It's bit of a shame it's described as "cyber attack", when it's a rather handy tool that can be misused. 18.104.22.168 (talk) 19:19, 29 March 2013 (UTC)
- It is an attack but it can also be a diagnostic. I have added a brief discussion with ref. -—Kvng 14:40, 1 April 2013 (UTC)