Just how do DDos attack

In this particular simple tutorial I am going to describe how to use LOIC, this program that  usually uses Private to unveiling known DDoS problems.
To begin with, let’s know very well what a DDos invasion is: anonymous chat
DDoS means Distributed Denial of Service Distributed Denial of Service Harm.

But what do these kind of attacks contain? Very easy: any computer has a control capacity limit, so when it surpasses that limit may cause overloads.

And the machines, although very powerful, remain computers.
In what it comprises then, is by using the push of the place to overload one or a couple of servers so the destination website is inoperative.
The legality of the type of problems has been questioned, nevertheless, you that they don’t do any harm, nor can grab information with them.

How can it work?

The first rung on the ladder is to disable the antivirus because this program is diagnosed as a trojan.
We downloaded this program here …
https://github.com/NewEraCracker/LOIC
or
https://sourceforge.net/tasks/loic/
Once downloaded, we unzip it and run it.
From here there are 2 ways to assault:

Automatic:

Important data for operating DDoS disorders are: IRC Server: here moves the server url Interface: this is actually the interface, generally it is 6667.
Route: by default it is #loic, but sometimes it changes.
The organizers of the DDoS disorders supply them. In this manner, it is all programmed. They control the episodes from their Computer and immediate them to where they need.After the data is placed, we tag IRC Method (HiveMind).This program will only hook up and begin DDoS attacks.

Manual:

First you must get into the URL the website that people want to assault (in Link, within Selected Concentrate on). For instance, yourwebsite.com, or any website! (certainly, do not undertake it).
Therefore we should create www.yourwebsite.com
Once the Link is entered, select Lock on, and in Selected Focus on an IP can look (lots segregated by dots). Then press IMMA CHARGIN MAH LAZER. This program will only hook up and start introducing DDoS attacks.