network background popup

DDoS Blog

Beware The Dangers Of Cross Site Scripting – XSS

Cross Site Scripting, or XSS, is a popular attack vector but why is it such a problem and what can you do to avoid becoming a victim?Basically, XSS is a code vulnerability in a website that allows an attacker to inject malicious client-side scripts into a web page. When you visit a site that has bee[...]

Jan 14th 2014

How To Secure Your Website and Increase its Performance

Do you want your website to be fast? Are you potentially losing sales due to a slow site load time? One of the best ways to increase your website’s performance is to take advantage of caching to accelerate the delivery of your site’s content.Websites are of course made up of individual elements.[...]

Jan 6th 2014

How DDoS Attacks Can Impact Your SEO

It seems like a day doesn’t go by without a story popping up on another major DDoS (distributed denial of service) attack. In the past couple of months, we’ve seen DDoS attacks on the Australian Federal Police, Reserve Bank of Australia, and RBS. DDoS attacks have plagued businesses and governme[...]

Dec 24th 2013

Why a Vulnerability Assessment is a must

Threats such as SQL injection and cross site scripting (XSS) have plagued online business for years, only lately getting the notoriety that they deserve, but for every threat that is publicized there are many more that never get the same attention. New vulnerabilities are discovered at an alarming r[...]

Nov 18th 2013

Monitoring TCP Connection States

Our newest software release will be a large update from our current software in place, offering many more configuration features and advanced monitoring. Currently, the DOSarrest staff members are already using the new software internally on the admin end, and are going through the final touches bef[...]

Oct 22nd 2013

How to Monitor Anycast

What is Anycast?Anycast is a routing configuration that takes the public IP address of a web service, such as a DNS or a website, and announces its reachability from more than one location. Normally, in a traditional routing configuration, the public IP address of the web service exists in only one [...]

Sep 28th 2013

Is 9/11 really a special date when it comes to DDoS attacks ?

Every year reports come out about an increased threat revolving around a particular date on the calendar, one such date is September 11th. The thing about DDoS attacks are, that they can happen any day or time and you rarely get advanced notice. One exception that we have seen is when extortion is i[...]

Sep 23rd 2013

Tools to Troubleshoot your Website’s Performance

We here at DOSarrest work with a wide variety of IT and business professionals on a day to day basis, from Website developers to CEOs. Even though DDoS protection services is our specialty, we are often asked about website performance and how our service can help. Our service when used properly and [...]

Sep 17th 2013

Protecting Your Server From a JSLOIC DDoS Attack

JavaScript Low Orbit Ion Cannon (JSLOIC) is a web-based variant of the LOIC DDoS attack tool popularized by the cyber activist/hacker group “Anonymous”. Because the DDoStool is written in JavaScript it allows the JSLOIC code to be embedded into a web page. A person visiting the web page could po[...]

Aug 22nd 2013

Tips To Prepare For A DDoS Attack

IT security experts report that distributed denial of service (DDoS) attacks are a growing concern for 2013: this trend is proved by the countless attacks during 2012 and shown from the findings on the latest CSI Computer Crime & Security Survey, which attracts widespread media attention and is [...]

Jul 3rd 2013

DDoS Article Categories