Talk:Ping flood

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Computing / Networking (Rated Stub-class, Low-importance)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Stub-Class article Stub  This article has been rated as Stub-Class on the project's quality scale.
 Low  This article has been rated as Low-importance on the project's importance scale.
Taskforce icon
This article is supported by Networking task force (marked as Mid-importance).

Line speeds[edit]

Attacker on a T1 line and victim on a dial-up modem seems a bit too disproportionate.... 16:41, 23 November 2006 (UTC)

-Updated to DSL and Dial-Up -- 20:43, 25 May 2007 (UTC)
Modern DSL lines are much faster than T1 (I'm on 17Mbps myself), so what's the point? —Preceding unsigned comment added by (talk) 18:30, 22 September 2008 (UTC)

Batch file description[edit]

Should we really tell people how a ping flood attack batch file looks like? Won't that encourage people to send this type of cyberattack? —Preceding unsigned comment added by (talk) 12:59, 4 November 2008 (UTC)

Since those most likely to need us to write the batch file for them are possibly still on dial-up, or at least not on a very fat pipe, we probably could have one without increasing the number of successful attacks. On the other hand, this is an encyclopedia, not a how-to. I'm just going to wipe the section instead of leaving an ugly asdjnajdkgbl thing there. (talk) 02:37, 27 February 2009 (UTC)

Print reference needed[edit]

If this subject is written about in a computer book, a reference to it would be nice. im not an expert, but i could not find any decent online references, oddly enough.Mercurywoodrose (talk) 18:30, 22 August 2009 (UTC)

Not always an attack?[edit]

Isn't a ping flood a valid (though questionably useful) diagnostic tool when used in short durations? Unix-derived OSes contain the ping -f option which makes it literally that simple (as long as you have su privileges) to start sending the "flood". If ABUSED it's an "attack", but need every use of the command be automatically given that label? I don't personally believe so.

Some reference may also be wanted as to the fact that *nix systems allow the ping -f command but the Windows ping utility includes no such function. — Preceding unsigned comment added by (talk) 17:41, 1 September 2011 (UTC)

Batch - Yura87 (talk) 16:25, 9 August 2012 (UTC)[edit]

On WIndows it is a dumb looper: Entry point, ping command, redirect to entry point. VERY simply done - and it could be part of DDoS attacks. @echo off&:1&ping 1 - expressed in one line.

Not an attack![edit]

Ping flood is not an attack!

I use ping flood every day to somehow simulate more traffic than simple ping does make. That makes it a quick way to approximate packet loss on wifi for example. So it's actually pretty handy tool. It's bit of a shame it's described as "cyber attack", when it's a rather handy tool that can be misused. (talk) 19:19, 29 March 2013 (UTC)

It is an attack but it can also be a diagnostic. I have added a brief discussion with ref. -—Kvng 14:40, 1 April 2013 (UTC)