ping of death
(ping &v deth) (n.) A type of DoS attack in which the attacker sends a ping request that is larger than 65,536 bytes, which is the maximum size that IP allows. While a ping larger than 65,536 bytes is too large to fit in one packet that can be transmitted, TCP/IP allows a packet to be fragmented, essentially splitting the packet into smaller segments that are eventually reassembled. Attacks took advantage of this flaw by fragmenting packets that when received would total more than the allowed number of bytes and would effectively cause a buffer overload on the operating system at the receiving end, crashing the system.
Ping of death attacks are rare today as most operating systems have been fixed to prevent this type of attack from occurring.
Read Also:
- ping triangulation
A process developed by IBM in which client requests over the Internet can be routed to the cell that is geographically closest. When one or more mirror sites exists, ping triangulation uses a process called echo location. When a server receives a client request, it sends out an ICMP echo, or ping, packet across the […]
- pinout
A diagram or table that describes the purpose of each pin in a chip or connector, or each wire in a cable.
- pinned item list
The list of programs on the Start menu in the Microsoft Windows OS is divided into two parts: the programs displayed above the separator line (also known as the pinned items list) and the programs displayed below the separator line (also known as the most frequently used programs list). The programs on the pinned items […]
- pipe
)A temporary software connection between two programs or commands. Normally, the operating system accepts input from the keyboard and sends output to the display screen. Sometimes, however, it is useful to use the output from one command as the input for a second command, without passing the data through the keyboard or display screen. Pipes […]
- pipeline burst cache
A type of memory cache built into many modern DRAM controller and chipset designs. Pipeline burst caches use two techniques – a burst mode that pre-fetches memory contents before they are requested, and pipelining so that one memory value can be accessed in the cache at the same time that another memory value is accessed […]