<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Frostd&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Frostd&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/Frostd"/>
		<updated>2026-04-10T00:20:32Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/User:Skip</id>
		<title>User:Skip</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/User:Skip"/>
				<updated>2009-11-23T20:56:58Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;Added link to Group 7s page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Human Computer Interaction =&lt;br /&gt;
&lt;br /&gt;
=='''This is the projects main page for cs4hc3 and se4f03''' -- ''HCI / CHI'' Courses.==&lt;br /&gt;
&lt;br /&gt;
===Objectives===&lt;br /&gt;
&lt;br /&gt;
===Logistics===&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    During the middle of term the class will be divided into about 12 (n) groups, each of whom will negotiate amongst&lt;br /&gt;
    themselves a topic of concentration from the list below with at least three ranked by selected priority.&lt;br /&gt;
    At an early designated lecture, each group will be linked to a topic of their choice in a first-come/first-served&lt;br /&gt;
    basis -- only one group per project.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    Group members should all have their associated member email addresses and use these to generate a wiki in one of the&lt;br /&gt;
    groups member names.  Note that ALL changes made to a wiki are logged by IP address of the machine, as well as time&lt;br /&gt;
    and date.  By law Derek Lipiec MUST always be running an audit trail system which essentially operates as a key logger&lt;br /&gt;
    in that if any vandalism is done electronically, he can determine who is logged on, from where as well as what was typed.&lt;br /&gt;
    This is a warning that anyone modifying a group's wiki who is NOT a member of that group will be caught and risk a zero&lt;br /&gt;
    grade for this assignment exists.  Therefore &amp;quot;play safe&amp;quot; and do not fool around.  (wfsp)&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    Just after several weeks of class duration, a created wiki from each group will be completed&lt;br /&gt;
    and marked.  As soon as scheduled, these dates will be posted in the ELM calendar for this course.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    Part of this mark will be composed of 12 other rankings (by three groups of four members each as listed below)&lt;br /&gt;
    from &amp;lt;b&amp;gt;each&amp;lt;/b&amp;gt; of the other group members, &amp;lt;b&amp;gt;done individually&amp;lt;/b&amp;gt;, who will rank and provide one sentence&lt;br /&gt;
    of what is best and one sentence of what is worst about the subject wiki under consideration.  This is done&lt;br /&gt;
    through sending Dr.Poehlman an email with the three marks and single sentences for like and dislike reasons.&lt;br /&gt;
    The ranking for each wiki will be compiled by the instructor and posted anonymously for class consideration&lt;br /&gt;
    and discussion near the end of term.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Topics:===&lt;br /&gt;
Reference -- adapted from ACM (Association for Computing Machinery -- but people can join, too!) http://wiki.acm.org/cs2001/index.php?title=HUMAN-COMPUTER_INTERACTION&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Motivation:''' Why the study of how people interact with technology is vital for the development of most usable and acceptable systems. [[Motivations for the Studying of HCI]] (Taken by Group 10 -- wfsp/15nov09@14:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Contexts for HCI:''' mobile devices, consumer devices, business applications, web, business applications, collaboration systems, games, etc. [[Contexts for HCI]] (Taken by Group 8 -- wfsp/05nov09@14:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''[[Process_for_User-centered_Development]]:''' early focus on users, empirical testing, iterative design. (Specified for Group 11 -- wfsp/15nov09@14:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''[[Different measures for evaluation]]:''' utility, efficiency, learnability, user satisfaction. (Taken by Group 5 -- wfsp/10nov09@13:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Models that inform human-computer interaction (HCI) design:''' attention, perception and recognition, movement, and cognition.&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''Social issues influencing HCI design and use:''' culture, communication, and organizations. (Taken by Group 3 -- wfsp/13nov09@15:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''[[HCI - Accommodating human diversity]]:''' including universal design and accessibility and designing for multiple cultural and linguistic contexts. (Taken by Group 9 -- wfsp/12nov09@13:30)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The most '''[[Common Interface Mistakes]]'''. (Taken by Group 1 -- wfsp/04nov09@17:00)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; '''[[User Interface Standards]]'''. (Taken by Group 6 -- wfsp/05nov09@19:30)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The '''five interaction styles''' as espoused by [[B.Scheidermann]]. [[Five Interaction Styles]] (Taken by Group 7 -- wfsp/04nov09@17:30)&amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The '''Object-Action''' (or visa-versa) '''model''' and its applications. [[The Object-Action (or_visa-versa) model and its applications]](Specified for Group 2 -- wfsp/15nov09@14:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
  &amp;lt;Li&amp;gt; The '''direct manipulation method''' and its importance to CHI. [[Direct Manipulation]] (Taken by Group 4 -- wfsp/06nov09@09:30) &amp;lt;/Li&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&amp;lt;h4&amp;gt;&lt;br /&gt;
  Marking Duties for Each Group:&lt;br /&gt;
&amp;lt;/h4&amp;gt;&lt;br /&gt;
&amp;lt;table  border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;th&amp;gt;&lt;br /&gt;
      &amp;lt;u&amp;gt;Group   Mark1   Mark2   Mark3&amp;lt;/u&amp;gt;&lt;br /&gt;
    &amp;lt;/th&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      1   Group 2  Group 3  Group 4&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      2   Group 3  Group 4  Group 5&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      3   Group 4  Group 5  Group 6&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      4   Group 5  Group 6  Group 7&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      5   Group 6  Group 7  Group 8&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      6   Group 7  Group 8  Group 9&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      7   Group 8  Group 9  Group 10&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      8   Group 9  Group 10 Group 11&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      9   Group 10 Group 11 Group 01&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      10  Group 11 Group 01 Group 02&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
  &amp;lt;tr&amp;gt;&lt;br /&gt;
    &amp;lt;td&amp;gt;&lt;br /&gt;
      11  Group 01 Group 02 Group 03&lt;br /&gt;
    &amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=='''This is the VRML assignment main page for cs4hc3 and se4f03''' &amp;lt;br&amp;gt; -- ''HCI / CHI'' Courses.==&lt;br /&gt;
NOTE:  This is NOT required for the 2009-2010 version of this course.&lt;br /&gt;
===Some Important References:===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    The Custom Courseware for this course has an Appendix section for VRML beginners so this is a good place to begin studying if you are not familiar with the Virtual Reality Modelling Language.  We will be using this to create 3-D interfaces for 3-D worlds, just to get some practice in thinking in more than two dimensions.  Although VRML has been around for more than a decade, it is still found as the 3-D layer in MPEG4, has been updated and in a standard in the W3C world known as X3D, which is just VRML with &amp;lt;elements&amp;gt; instead of reserved keywords.  If you know VRML, you know X3D.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    To begin our study of the Virtual Reality Modeling Language (VRML), we need to get setup to view the VRML code (which is in pure ASCII, as is Javascript, etc.)  To create VRML, use any ASCII editor that you like best.  I use Crimson Editor which has a built-in context sensitive markup that understands VRML, so it is easy to distinguish comments from verbs and nouns, etc.&lt;br /&gt;
Go to http://sourceforge.net/projects/emeraldeditor/files/ where Emerald Editor (the newest version of the Crimson editor) can be downloaded freely.  To interpret VRML code (nested in HTML code) you need a plug-in.  The best that I have found is called Cortona from Parallel Graphics at http://www.cortona3d.com/cortona/ .  It works best with Apple Safari Browser version 4 from http://www.apple.com/safari/download/ .  All of this information is at the end of the course web site section on VRML at http://www.cas.mcmaster.ca/~se4d03/demo.html#VRML headed with the title &amp;quot;Recommended Client Applications&amp;quot;.  By the way, Parallel Graphics has an editor called VRMLPad that is not free but can be downloaded as a trial version, which may help the beginner as it provides a thumbnail sketch at the margin right when it recognizes any VRML code shape primitives -- interesting thing to see work.&lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;li&amp;gt;&lt;br /&gt;
    As far as web references go, the best place to start is on the course web site: &amp;lt;br&amp;gt; --&lt;br /&gt;
    http://www.cas.mcmaster.ca/~se4d03/demo.html#VRML &lt;br /&gt;
  &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;ol&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      Once here you can take the tutorial, done by a senior thesis student Polo Cerone several year's ago.&lt;br /&gt;
      It can be taken on-line or downloaded and worked through locally -- either is equivalent.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
    &amp;lt;li&amp;gt;&lt;br /&gt;
      Once the tutorial is taken, there are many example VRML code snippets that can be viewed with whatever browser plug-in that you have installed.  Pay particular attention to the graduated examples that show how one specifically goes about creating an interface in VRML that controls objects in the main scene graph.  This is located back near the beginning of the VRML section titled &amp;quot;Graduated VRML2 Interface Examples&amp;quot;.&lt;br /&gt;
    &amp;lt;/li&amp;gt;&lt;br /&gt;
  &amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles</id>
		<title>Five Interaction Styles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles"/>
				<updated>2009-11-23T20:43:28Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''Five Interaction Styles''' originally presented by Ben Shneiderman in 1983 represent the five basic ways that humans interact with a computer interface. Each interaction style effects the overall efficiency and usability of the computer system, but that is not to say there are good or bad interaction styles. The styles all have benefits and trade offs when dealing with certain types of users and it is often in an interface designers best interest to use a combination of styles instead of anyone one style alone.&lt;br /&gt;
&lt;br /&gt;
= Shneiderman's Five Interaction Styles =&lt;br /&gt;
&lt;br /&gt;
== Visual representation ==&lt;br /&gt;
[[Image:DirectManipulation.jpg|thumb|300px|right|Simple example of file/folder metaphor in Windows Vista]]&lt;br /&gt;
&lt;br /&gt;
Visual representation (also known as [[Direct Manipulation]]) features a natural representation of task [http://www.cas.mcmaster.ca/wiki/index.php/The_Object-Action_%28or_visa-versa%29_model_and_its_applications objects and actions]. This helps present the process as actually performing a task itself directly even though it is being doing through an intermediary like a computer. The visual representation usually takes the form of a metaphor related to the actual task being performed. In this way well designed visual representation systems tend to make the interaction enjoyable for the users, which is excellent for novice users or complex tasks that can lead to anxiety.&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Visual presentation of task concepts&lt;br /&gt;
* Allows easy learning&lt;br /&gt;
* Encourages exploration&lt;br /&gt;
* Users can immediately see if their actions are furthering their goals&lt;br /&gt;
* Users gain confidence because they feel in control and can predict system responses&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Can be hard to implement&lt;br /&gt;
* Requires graphics display/pointing devices&lt;br /&gt;
&lt;br /&gt;
== Menus ==&lt;br /&gt;
[[Image:menus1.gif|thumb|300px|right|Example of a typical menu in Windows XP]]&lt;br /&gt;
[[Image:menus2.gif|thumb|300px|right|Microsoft's new &amp;quot;ribbon&amp;quot; menu]]&lt;br /&gt;
&lt;br /&gt;
Menus provide a way to visually organise a very large set of actions. Menus are nearly ubiquitous in modern applications, with the most standard format being the &amp;quot;File/Edit&amp;quot; strip located across the top of windows (such as in Microsoft Windows) or the user's workspace (such as in Multiple Document Interfaces or in Mac OS X).&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Accessible to novice and intermittent users &lt;br /&gt;
* Allows for a very large pallette of structured commands which can be easily &amp;quot;explored&amp;quot;&lt;br /&gt;
* Facilitates Multiple Document Interfaces well&lt;br /&gt;
* Does not rely on parsing input&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Can bury useful features under complex hierarchies&lt;br /&gt;
* Number of items limited by screen resolution&lt;br /&gt;
* Convention restricts how menu items are categorised&lt;br /&gt;
&lt;br /&gt;
== Fill-In-The-Blanks ==&lt;br /&gt;
[[Image:formfillin1.gif|thumb|300px|right|Classic Fill-In-The-Blanks]]&lt;br /&gt;
[[Image:formfillin2.gif|thumb|300px|right|Modern-day Fill-In-The-Blanks]]&lt;br /&gt;
The Fill-In-The-Blanks interaction style (also known as &amp;quot;Form Fill-in&amp;quot;) is best suited to data input, which was aimed at a different set of users than command language, specially non-experts users. Originally Fill-In-The-Blanks is to arrange one or more fields in the form of a prose sentence or phrase, with the fields as &amp;quot;blanks&amp;quot; to be filled in by the user. The TAB-key was designed and is still being used to switch between the fields and ENTER to submit the form. Therefore a pointing device (such as a mouse) was not really needed at that time. However it's very common to mix forms with other interaction styles in software design, such as drop down menus, check boxes etc. The spreadsheet is a variation on the Form Fill-in interaction style. Even today, there are quite a few computers are still purely forms-based in the industry, like cash registers, financial systems, stock control systems, and so on. The main reason is because the Fill-In-The-Blanks interface is especially useful for routine, clerical work or those tasks require a great amount of data entry.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Simplifies data entry&lt;br /&gt;
* Minimal training - Shortens learning in that the fields are predefined and need only be 'recognized'.&lt;br /&gt;
* Gives convenient assistance - Guides the user via the predefined rules&lt;br /&gt;
* Permits use of form-management tools&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Screen space consuming&lt;br /&gt;
* requires more keystrokes&lt;br /&gt;
* requires handling typing errors (bad for users with poor typing skills)&lt;br /&gt;
&lt;br /&gt;
== Command Line ==&lt;br /&gt;
[[Image:Commandline.png|thumb|300px|right|Ubuntu command line showing basic commands]]&lt;br /&gt;
&lt;br /&gt;
Command line is the earliest used interaction style and is still seen predominantly in Unix operating systems though still usable to varying degrees on Windows and OSX. This style is mainly used by expert users by typing into a prompt that allows them to quickly execute commands. Unfortunately command line places a considerable burden on the user to learn and recall commands from memory. It is often the case that commands take parameters as well and most of the added benefits (mainly in the way of efficiency) come from using them. This leads to an unfriendly environment for both novice and intermediate users that may attempt to use this style. The large overhead in learning commands and minimal help for the user leaves this style almost exclusively in the domain of the expert user.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* quick and powerful for experienced users&lt;br /&gt;
* user-controlled interaction&lt;br /&gt;
* minimal amount of typing (no mouse use)&lt;br /&gt;
* can be used in conjunction with other user interfaces&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* little or no prompting&lt;br /&gt;
* requires user’s knowledge of system, programs&lt;br /&gt;
* relies on recall of commands and syntax&lt;br /&gt;
* difficult to learn&lt;br /&gt;
* error prone&lt;br /&gt;
&lt;br /&gt;
== Natural Language ==&lt;br /&gt;
Natural Language is an interaction style which allows the user to communicate with their computer through a series of spoken commands, similar to how one may issue spoken commands to another person. However the benefits and applicability of Natural Language systems thus far is very limited, largely due to the imprecise and verbose nature of spoken languages. A major issue with using spoken language is that to communicate with computer systems the vocabulary would need to be limited to a specific subset of a full natural language, in order to both reduce ambiguity and keep processing time within reasonable bounds. One solution to the ambiguity of spoken languages is to utilize gestural language, which is considered at least as natural as verbal language. At the same time, the definition of what makes a natural language is very important. It is not as though humans are born knowing spoken word or gestures; a natural language is simply one which can be grasped fluently by the time one is required to draw upon it. A language could be considered natural, if upon approaching a computer the typical user already possesses language skills adequate for communicating desired concepts in a fluent and articulate manner. So in a sense Natural Language could involve a kind of language humans develop with the sole purpose of communicating with computer systems, thus potentially eliminating the ambiguities of the current natural spoken languages. Thus far however Natural Language has not seen widespread use, and often requires each user to train the computer to recognize their own voice. Natural Language could be very useful for those with minimal keyboard skills, and once it more accurately interprets verbal commands may even see widespread use one day. &amp;lt;sup&amp;gt;[2][3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Allows users to communicate with their system naturally&lt;br /&gt;
* Can reduce or eliminate the need for keyboards, great for those with poor keyboard skills&lt;br /&gt;
* Once it is more accurate at interpreting speech, commands may be able to be spoken faster than they are typed&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Currently cannot accurately interpret much of verbal language, which is too ambiguous&lt;br /&gt;
* Requires a lot of training for each user so it can interpret their verbal commands&lt;br /&gt;
&lt;br /&gt;
= See also =&lt;br /&gt;
&lt;br /&gt;
* [[Motivations for the Studies of HCI]]&lt;br /&gt;
* [[Contexts for HCI]]&lt;br /&gt;
* [[Process for User-centered Development]]&lt;br /&gt;
* [[Social issues influencing HCI design and use]]&lt;br /&gt;
* [[HCI - Accommodating human diversity]]&lt;br /&gt;
* [[User Interface Standards]]&lt;br /&gt;
* [[The Object-Action (or visa-versa) model and its applications]]&lt;br /&gt;
* [[Direct Manipulation]]&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
# Mads Soegaard, &amp;quot;Interaction Styles&amp;quot;, interaction-design.org, http://www.interaction-design.org/encyclopedia/interaction_styles.html&lt;br /&gt;
# Byron Long, &amp;quot;Natural Language as an Interaction Style&amp;quot;, Retrieved on November 21st, 2009 from http://www.dgp.toronto.edu/people/byron/papers/nli.html&lt;br /&gt;
# Bill Buxton, &amp;quot;The &amp;quot;Natural&amp;quot; Language of Interaction&amp;quot;, Retrieved on November 21st, 2009 from http://www.billbuxton.com/natural.html&lt;br /&gt;
&lt;br /&gt;
--[[User:Shensw|Shensw]] 22:55, 20 November 2009 (EST)&lt;br /&gt;
&lt;br /&gt;
--[[User:Collim|Collim]] 23:50, 21 November 2009 (EST)&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 00:58, 22 November 2009 (EST)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles</id>
		<title>Five Interaction Styles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles"/>
				<updated>2009-11-23T20:41:09Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;Added Visual representation picture&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''Five Interaction Styles''' originally presented by Ben Shneiderman in 1983 represent the five basic ways that humans interact with a computer interface. Each interaction style effects the overall efficiency and usability of the computer system, but that is not to say there are good or bad interaction styles. The styles all have benefits and trade offs when dealing with certain types of users and it is often in an interface designers best interest to use a combination of styles instead of anyone one style alone.&lt;br /&gt;
&lt;br /&gt;
= Shneiderman's Five Interaction Styles =&lt;br /&gt;
&lt;br /&gt;
== Visual representation ==&lt;br /&gt;
[[Image:DirectManipulation.jpg|thumb|300px|right|Simple example of file/folder metaphor in Windows Vista]]&lt;br /&gt;
&lt;br /&gt;
Visual representation (also known as [[Direct Manipulation]]) features a natural representation of task [http://www.cas.mcmaster.ca/wiki/index.php/The_Object-Action_%28or_visa-versa%29_model_and_its_applications objects and actions]. This helps present the process as actually performing a task itself directly even though it is being doing through an intermediary like a computer. The visual representation usually takes the form of a metaphor related to the actual task being performed. In this way well designed visual representation systems tend to make the interaction enjoyable for the users, which is excellent for novice users or complex tasks that can lead to anxiety.&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Visual presentation of task concepts&lt;br /&gt;
* Allows easy learning&lt;br /&gt;
* Encourages exploration&lt;br /&gt;
* Users can immediately see if their actions are furthering their goals&lt;br /&gt;
* Users gain confidence because they feel in control and can predict system responses&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Can be hard to implement&lt;br /&gt;
* Requires graphics display/pointing devices&lt;br /&gt;
&lt;br /&gt;
== Menus ==&lt;br /&gt;
[[Image:menus1.gif|thumb|300px|right|Example of a typical menu in Windows XP]]&lt;br /&gt;
[[Image:menus2.gif|thumb|300px|right|Microsoft's new &amp;quot;ribbon&amp;quot; menu]]&lt;br /&gt;
&lt;br /&gt;
Menus provide a way to visually organise a very large set of actions. Menus are nearly ubiquitous in modern applications, with the most standard format being the &amp;quot;File/Edit&amp;quot; strip located across the top of windows (such as in Microsoft Windows) or the user's workspace (such as in Multiple Document Interfaces or in Mac OS X).&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Accessible to novice and intermittent users &lt;br /&gt;
* Allows for a very large pallette of structured commands which can be easily &amp;quot;explored&amp;quot;&lt;br /&gt;
* Facilitates Multiple Document Interfaces well&lt;br /&gt;
* Does not rely on parsing input&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Can bury useful features under complex hierarchies&lt;br /&gt;
* Number of items limited by screen resolution&lt;br /&gt;
* Convention restricts how menu items are categorised&lt;br /&gt;
&lt;br /&gt;
== Fill-In-The-Blanks ==&lt;br /&gt;
[[Image:formfillin1.gif|thumb|300px|right|Classic Fill-In-The-Blanks]]&lt;br /&gt;
[[Image:formfillin2.gif|thumb|300px|right|Modern-day Fill-In-The-Blanks]]&lt;br /&gt;
The Fill-In-The-Blanks interaction style (also known as &amp;quot;Form Fill-in&amp;quot;) is best suited to data input, which was aimed at a different set of users than command language, specially non-experts users. Originally Fill-In-The-Blanks is to arrange one or more fields in the form of a prose sentence or phrase, with the fields as &amp;quot;blanks&amp;quot; to be filled in by the user. The TAB-key was designed and is still being used to switch between the fields and ENTER to submit the form. Therefore a pointing device (such as a mouse) was not really needed at that time. However it's very common to mix forms with other interaction styles in software design, such as drop down menus, check boxes etc. The spreadsheet is a variation on the Form Fill-in interaction style. Even today, there are quite a few computers are still purely forms-based in the industry, like cash registers, financial systems, stock control systems, and so on. The main reason is because the Fill-In-The-Blanks interface is especially useful for routine, clerical work or those tasks require a great amount of data entry.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Simplifies data entry&lt;br /&gt;
* Minimal training - Shortens learning in that the fields are predefined and need only be 'recognized'.&lt;br /&gt;
* Gives convenient assistance - Guides the user via the predefined rules&lt;br /&gt;
* Permits use of form-management tools&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Screen space consuming&lt;br /&gt;
* requires more keystrokes&lt;br /&gt;
* requires handling typing errors (bad for users with poor typing skills)&lt;br /&gt;
&lt;br /&gt;
== Command Line ==&lt;br /&gt;
[[Image:Commandline.png|thumb|300px|right|Ubuntu command line showing basic commands]]&lt;br /&gt;
&lt;br /&gt;
Command line is the earliest used interaction style and is still seen predominantly in Unix operating systems though still usable to varying degrees on Windows and OSX. This style is mainly used by expert users by typing into a prompt that allows them to quickly execute commands. Unfortunately command line places a considerable burden on the user to learn and recall commands from memory. It is often the case that commands take parameters as well and most of the added benefits (mainly in the way of efficiency) come from using them. This leads to an unfriendly environment for both novice and intermediate users that may attempt to use this style. The large overhead in learning commands and minimal help for the user leaves this style almost exclusively in the domain of the expert user.&amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* quick and powerful for experienced users&lt;br /&gt;
* user-controlled interaction&lt;br /&gt;
* minimal amount of typing (no mouse use)&lt;br /&gt;
* can be used in conjunction with other user interfaces&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* little or no prompting&lt;br /&gt;
* requires user’s knowledge of system, programs&lt;br /&gt;
* relies on recall of commands and syntax&lt;br /&gt;
* difficult to learn&lt;br /&gt;
* error prone&lt;br /&gt;
&lt;br /&gt;
== Natural Language ==&lt;br /&gt;
Natural Language is an interaction style which allows the user to communicate with their computer through a series of spoken commands, similar to how one may issue spoken commands to another person. However the benefits and applicability of Natural Language systems thus far is very limited, largely due to the imprecise and verbose nature of spoken languages. A major issue with using spoken language is that to communicate with computer systems the vocabulary would need to be limited to a specific subset of a full natural language, in order to both reduce ambiguity and keep processing time within reasonable bounds. One solution to the ambiguity of spoken languages is to utilize gestural language, which is considered at least as natural as verbal language. At the same time, the definition of what makes a natural language is very important. It is not as though humans are born knowing spoken word or gestures; a natural language is simply one which can be grasped fluently by the time one is required to draw upon it. A language could be considered natural, if upon approaching a computer the typical user already possesses language skills adequate for communicating desired concepts in a fluent and articulate manner. So in a sense Natural Language could involve a kind of language humans develop with the sole purpose of communicating with computer systems, thus potentially eliminating the ambiguities of the current natural spoken languages. Thus far however Natural Language has not seen widespread use, and often requires each user to train the computer to recognize their own voice. Natural Language could be very useful for those with minimal keyboard skills, and once it more accurately interprets verbal commands may even see widespread use one day. &amp;lt;sup&amp;gt;[2][3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Allows users to communicate with their system naturally&lt;br /&gt;
* Can reduce or eliminate the need for keyboards, great for those with poor keyboard skills&lt;br /&gt;
* Once it is more accurate at interpreting speech, commands may be able to be spoken faster than they are typed&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Currently cannot accurately interpret much of verbal language, which is too ambiguous&lt;br /&gt;
* Requires a lot of training for each user so it can interpret their verbal commands&lt;br /&gt;
&lt;br /&gt;
= See also =&lt;br /&gt;
&lt;br /&gt;
* [[Motivations for the Studies of HCI]]&lt;br /&gt;
* [[Contexts for HCI]]&lt;br /&gt;
* [[Process for User-centered Development]]&lt;br /&gt;
* [[Social issues influencing HCI design and use]]&lt;br /&gt;
* [[HCI - Accommodating human diversity]]&lt;br /&gt;
* [[User Interface Standards]]&lt;br /&gt;
* [[The Object-Action (or visa-versa) model and its applications]]&lt;br /&gt;
* [[Direct Manipulation]]&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
# Mads Soegaard, &amp;quot;Interaction Styles&amp;quot;, interaction-design.org, http://www.interaction-design.org/encyclopedia/interaction_styles.html&lt;br /&gt;
# Byron Long, &amp;quot;Natural Language as an Interaction Style&amp;quot;, Retrieved on November 21st, 2009 from http://www.dgp.toronto.edu/people/byron/papers/nli.html&lt;br /&gt;
# Bill Buxton, &amp;quot;The &amp;quot;Natural&amp;quot; Language of Interaction&amp;quot;, Retrieved on November 21st, 2009 from http://www.billbuxton.com/natural.html&lt;br /&gt;
&lt;br /&gt;
= External links =&lt;br /&gt;
&lt;br /&gt;
--[[User:Shensw|Shensw]] 22:55, 20 November 2009 (EST)&lt;br /&gt;
&lt;br /&gt;
--[[User:Collim|Collim]] 23:50, 21 November 2009 (EST)&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 00:58, 22 November 2009 (EST)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:DirectManipulation.jpg</id>
		<title>File:DirectManipulation.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:DirectManipulation.jpg"/>
				<updated>2009-11-23T20:39:01Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;Simple example of direct manipulation in windows&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Simple example of direct manipulation in windows&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles</id>
		<title>Five Interaction Styles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles"/>
				<updated>2009-11-23T17:36:26Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''Five Interaction Styles''' originally presented by Ben Shneiderman in 1983 represent the five basic ways that humans interact with a computer interface. Each interaction style effects the overall efficiency and usability of the computer system, but that is not to say there are good or bad interaction styles. The styles all have benefits and trade offs when dealing with certain types of users and it is often in an interface designers best interest to use a combination of styles instead of anyone one style alone.&lt;br /&gt;
&lt;br /&gt;
= Shneiderman's Five Interaction Styles =&lt;br /&gt;
&lt;br /&gt;
== Visual representation ==&lt;br /&gt;
&lt;br /&gt;
Visual representation (also known as [[Direct Manipulation]]) features a natural representation of task [http://www.cas.mcmaster.ca/wiki/index.php/The_Object-Action_%28or_visa-versa%29_model_and_its_applications objects and actions]. This helps present the process as actually performing a task itself directly even though it is being doing through an intermediary like a computer. The visual representation usually takes the form of a metaphor related to the actual task being performed. In this way well designed visual representation systems tend to make the interaction enjoyable for the users, which is excellent for novice users or complex tasks that can lead to anxiety.&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Visual presentation of task concepts&lt;br /&gt;
* Allows easy learning&lt;br /&gt;
* Encourages exploration&lt;br /&gt;
* Users can immediately see if their actions are furthering their goals&lt;br /&gt;
* Users gain confidence because they feel in control and can predict system responses&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Can be hard to implement&lt;br /&gt;
* Requires graphics display/pointing devices&lt;br /&gt;
&lt;br /&gt;
== Menus ==&lt;br /&gt;
&lt;br /&gt;
== Fill-In-The-Blanks ==&lt;br /&gt;
[[Image:formfillin1.gif|thumb|300px|right|Classic Fill-In-The-Blanks]]&lt;br /&gt;
[[Image:formfillin2.gif|thumb|300px|right|Modern-day Fill-In-The-Blanks]]&lt;br /&gt;
The Fill-In-The-Blanks interaction style (also known as &amp;quot;Form Fill-in&amp;quot;) is best suited to data input, which was aimed at a different set of users than command language, specially non-experts users. Originally Fill-In-The-Blanks is to arrange one or more fields in the form of a prose sentence or phrase, with the fields as &amp;quot;blanks&amp;quot; to be filled in by the user. The TAB-key was designed and is still being used to switch between the fields and ENTER to submit the form. Therefore a pointing device (such as a mouse) was not really needed at that time. However it's very common to mix forms with other interaction styles in software design, such as drop down menus, check boxes etc. The spreadsheet is a variation on the Form Fill-in interaction style. Even today, there are quite a few computers are still purely forms-based in the industry, like cash registers, financial systems, stock control systems, and so on. The main reason is because the Fill-In-The-Blanks interface is especially useful for routine, clerical work or those tasks require a great amount of data entry.&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Simplifies data entry&lt;br /&gt;
* Minimal training - Shortens learning in that the fields are predefined and need only be 'recognized'.&lt;br /&gt;
* Gives convenient assistance - Guides the user via the predefined rules&lt;br /&gt;
* Permits use of form-management tools&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Screen space consuming&lt;br /&gt;
* requires more keystrokes&lt;br /&gt;
* requires handling typing errors (bad for users with poor typing skills)&lt;br /&gt;
&lt;br /&gt;
== Command Line ==&lt;br /&gt;
[[Image:Commandline.png|thumb|300px|right|Ubuntu command line showing basic commands]]&lt;br /&gt;
&lt;br /&gt;
Command line is the earliest used interaction style and is still seen predominantly in Unix operating systems though still usable to varying degrees on Windows and OSX. This style is mainly used by expert users by typing into a prompt that allows them to quickly execute commands. Unfortunately command line places a considerable burden on the user to learn and recall commands from memory. It is often the case that commands take parameters as well and most of the added benefits (mainly in the way of efficiency) come from using them. This leads to an unfriendly environment for both novice and intermediate users that may attempt to use this style. The large overhead in learning commands and minimal help for the user leaves this style almost exclusively in the domain of the expert user.&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* quick and powerful for experienced users&lt;br /&gt;
* user-controlled interaction&lt;br /&gt;
* minimal amount of typing (no mouse use)&lt;br /&gt;
* can be used in conjunction with other user interfaces&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* little or no prompting&lt;br /&gt;
* requires user’s knowledge of system, programs&lt;br /&gt;
* relies on recall of commands and syntax&lt;br /&gt;
* difficult to learn&lt;br /&gt;
* error prone&lt;br /&gt;
&lt;br /&gt;
== Natural Language ==&lt;br /&gt;
Natural Language is an interaction style which allows the user to communicate with their computer through a series of spoken commands, similar to how one may issue spoken commands to another person. However the benefits and applicability of Natural Language systems thus far is very limited, largely due to the imprecise and verbose nature of spoken languages. A major issue with using spoken language is that to communicate with computer systems the vocabulary would need to be limited to a specific subset of a full natural language, in order to both reduce ambiguity and keep processing time within reasonable bounds. One solution to the ambiguity of spoken languages is to utilize gestural language, which is considered at least as natural as verbal language. At the same time, the definition of what makes a natural language is very important. It is not as though humans are born knowing spoken word or gestures; a natural language is simply one which can be grasped fluently by the time one is required to draw upon it. A language could be considered natural, if upon approaching a computer the typical user already possesses language skills adequate for communicating desired concepts in a fluent and articulate manner. So in a sense Natural Language could involve a kind of language humans develop with the sole purpose of communicating with computer systems, thus potentially eliminating the ambiguities of the current natural spoken languages. Thus far however Natural Language has not seen widespread use, and often requires each user to train the computer to recognize their own voice. Natural Language could be very useful for those with minimal keyboard skills, and once it more accurately interprets verbal commands may even see widespread use one day. &amp;lt;sup&amp;gt;[2][3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Allows users to communicate with their system naturally&lt;br /&gt;
* Can reduce or eliminate the need for keyboards, great for those with poor keyboard skills&lt;br /&gt;
* Once it is more accurate at interpreting speech, commands may be able to be spoken faster than they are typed&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Currently cannot accurately interpret much of verbal language, which is too ambiguous&lt;br /&gt;
* Requires a lot of training for each user so it can interpret their verbal commands&lt;br /&gt;
&lt;br /&gt;
= See also =&lt;br /&gt;
&lt;br /&gt;
* [[Motivations for the Studies of HCI]]&lt;br /&gt;
* [[Contexts for HCI]]&lt;br /&gt;
* [[Process for User-centered Development]]&lt;br /&gt;
* [[Social issues influencing HCI design and use]]&lt;br /&gt;
* [[HCI - Accommodating human diversity]]&lt;br /&gt;
* [[User Interface Standards]]&lt;br /&gt;
* [[The Object-Action (or visa-versa) model and its applications]]&lt;br /&gt;
* [[Direct Manipulation]]&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
# Mads Soegaard, &amp;quot;Interaction Styles&amp;quot;, interaction-design.org, http://www.interaction-design.org/encyclopedia/interaction_styles.html&lt;br /&gt;
# Byron Long, &amp;quot;Natural Language as an Interaction Style&amp;quot;, Retrieved on November 21st, 2009 from http://www.dgp.toronto.edu/people/byron/papers/nli.html&lt;br /&gt;
# Bill Buxton, &amp;quot;The &amp;quot;Natural&amp;quot; Language of Interaction&amp;quot;, Retrieved on November 21st, 2009 from http://www.billbuxton.com/natural.html&lt;br /&gt;
&lt;br /&gt;
= External links =&lt;br /&gt;
&lt;br /&gt;
--[[User:Shensw|Shensw]] 22:55, 20 November 2009 (EST)&lt;br /&gt;
&lt;br /&gt;
--[[User:Collim|Collim]] 23:50, 21 November 2009 (EST)&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 00:58, 22 November 2009 (EST)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles</id>
		<title>Five Interaction Styles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles"/>
				<updated>2009-11-22T22:25:47Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''Five Interaction Styles'''&lt;br /&gt;
&lt;br /&gt;
= Shneiderman's Five Interaction Styles =&lt;br /&gt;
&lt;br /&gt;
== Visual representation ==&lt;br /&gt;
&lt;br /&gt;
== Menus ==&lt;br /&gt;
&lt;br /&gt;
== Fill-In-The-Blanks ==&lt;br /&gt;
[[Image:formfillin1.gif|thumb|300px|right|Classic Fill-In-The-Blanks]]&lt;br /&gt;
[[Image:formfillin2.gif|thumb|300px|right|Modern-day Fill-In-The-Blanks]]&lt;br /&gt;
The Fill-In-The-Blanks interaction style (also known as &amp;quot;Form Fill-in&amp;quot;) is best suited to data input, which was aimed at a different set of users than command language, specially non-experts users. Originally Fill-In-The-Blanks is to arrange one or more fields in the form of a prose sentence or phrase, with the fields as &amp;quot;blanks&amp;quot; to be filled in by the user. The TAB-key was designed and is still being used to switch between the fields and ENTER to submit the form. Therefore a pointing device (such as a mouse) was not really needed at that time. However it's very common to mix forms with other interaction styles in software design, such as drop down menus, check boxes etc. The spreadsheet is a variation on the Form Fill-in interaction style. Even today, there are quite a few computers are still purely forms-based in the industry, like cash registers, financial systems, stock control systems, and so on. The main reason is because the Fill-In-The-Blanks interface is especially useful for routine, clerical work or those tasks require a great amount of data entry.&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Simplifies data entry&lt;br /&gt;
* Minimal training - Shortens learning in that the fields are predefined and need only be 'recognized'.&lt;br /&gt;
* Gives convenient assistance - Guides the user via the predefined rules&lt;br /&gt;
* Permits use of form-management tools&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Screen space consuming&lt;br /&gt;
* requires more keystrokes&lt;br /&gt;
* requires handling typing errors (bad for users with poor typing skills)&lt;br /&gt;
&lt;br /&gt;
== Command Line ==&lt;br /&gt;
[[Image:Commandline.png|thumb|300px|right|Ubuntu command line showing basic commands]]&lt;br /&gt;
&lt;br /&gt;
Command line is the earliest used interaction style and is still seen predominantly in Unix operating systems though still usable to varying degrees on Windows and OSX. This style is mainly used by expert users by typing into a prompt that allows them to quickly execute commands. Unfortunately command line places a considerable burden on the user to learn and recall commands from memory. It is often the case that commands take parameters as well and most of the added benefits (mainly in the way of efficiency) come from using them. This leads to an unfriendly environment for both novice and intermediate users that may attempt to use this style. The large overhead in learning commands and minimal help for the user leaves this style almost exclusively in the domain of the expert user.&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* quick and powerful for experienced users&lt;br /&gt;
* user-controlled interaction&lt;br /&gt;
* minimal amount of typing (no mouse use)&lt;br /&gt;
* can be used in conjunction with other user interfaces&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* little or no prompting&lt;br /&gt;
* requires user’s knowledge of system, programs&lt;br /&gt;
* relies on recall of commands and syntax&lt;br /&gt;
* difficult to learn&lt;br /&gt;
* error prone&lt;br /&gt;
&lt;br /&gt;
== Natural Language ==&lt;br /&gt;
Natural Language is an interaction style which allows the user to communicate with their computer through a series of spoken commands, similar to how one may issue spoken commands to another person. However the benefits and applicability of Natural Language systems thus far is very limited, largely due to the imprecise and verbose nature of spoken languages. A major issue with using spoken language is that to communicate with computer systems the vocabulary would need to be limited to a specific subset of a full natural language, in order to both reduce ambiguity and keep processing time within reasonable bounds. One solution to the ambiguity of spoken languages is to utilize gestural language, which is considered at least as natural as verbal language. At the same time, the definition of what makes a natural language is very important. It is not as though humans are born knowing spoken word or gestures; a natural language is simply one which can be grasped fluently by the time one is required to draw upon it. A language could be considered natural, if upon approaching a computer the typical user already possesses language skills adequate for communicating desired concepts in a fluent and articulate manner. So in a sense Natural Language could involve a kind of language humans develop with the sole purpose of communicating with computer systems, thus potentially eliminating the ambiguities of the current natural spoken languages. Thus far however Natural Language has not seen widespread use, and often requires each user to train the computer to recognize their own voice. Natural Language could be very useful for those with minimal keyboard skills, and once it more accurately interprets verbal commands may even see widespread use one day. &amp;lt;sup&amp;gt;[2][3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Allows users to communicate with their system naturally&lt;br /&gt;
* Can reduce or eliminate the need for keyboards, great for those with poor keyboard skills&lt;br /&gt;
* Once it is more accurate at interpreting speech, commands may be able to be spoken faster than they are typed&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Currently cannot accurately interpret much of verbal language, which is too ambiguous&lt;br /&gt;
* Requires a lot of training for each user so it can interpret their verbal commands&lt;br /&gt;
&lt;br /&gt;
= See also =&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
# Mads Soegaard, &amp;quot;Interaction Styles&amp;quot;, interaction-design.org, http://www.interaction-design.org/encyclopedia/interaction_styles.html&lt;br /&gt;
# Byron Long, &amp;quot;Natural Language as an Interaction Style&amp;quot;, Retrieved on November 21st, 2009 from http://www.dgp.toronto.edu/people/byron/papers/nli.html&lt;br /&gt;
# Bill Buxton, &amp;quot;The &amp;quot;Natural&amp;quot; Language of Interaction&amp;quot;, Retrieved on November 21st, 2009 from http://www.billbuxton.com/natural.html&lt;br /&gt;
&lt;br /&gt;
= External links =&lt;br /&gt;
&lt;br /&gt;
--[[User:Shensw|Shensw]] 22:55, 20 November 2009 (EST)&lt;br /&gt;
&lt;br /&gt;
--[[User:Collim|Collim]] 23:50, 21 November 2009 (EST)&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 00:58, 22 November 2009 (EST)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Commandline.png</id>
		<title>File:Commandline.png</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Commandline.png"/>
				<updated>2009-11-22T22:23:34Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;Commandline terminal example&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Commandline terminal example&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles</id>
		<title>Five Interaction Styles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles"/>
				<updated>2009-11-22T05:58:43Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''Five Interaction Styles'''&lt;br /&gt;
&lt;br /&gt;
= Shneiderman's Five Interaction Styles =&lt;br /&gt;
&lt;br /&gt;
== Visual representation ==&lt;br /&gt;
&lt;br /&gt;
== Menus ==&lt;br /&gt;
&lt;br /&gt;
== Fill-In-The-Blanks ==&lt;br /&gt;
[[Image:formfillin1.gif|thumb|300px|right|Classic Fill-In-The-Blanks]]&lt;br /&gt;
[[Image:formfillin2.gif|thumb|300px|right|Modern-day Fill-In-The-Blanks]]&lt;br /&gt;
The Fill-In-The-Blanks interaction style (also known as &amp;quot;Form Fill-in&amp;quot;) is best suited to data input, which was aimed at a different set of users than command language, specially non-experts users. Originally Fill-In-The-Blanks is to arrange one or more fields in the form of a prose sentence or phrase, with the fields as &amp;quot;blanks&amp;quot; to be filled in by the user. The TAB-key was designed and is still being used to switch between the fields and ENTER to submit the form. Therefore a pointing device (such as a mouse) was not really needed at that time. However it's very common to mix forms with other interaction styles in software design, such as drop down menus, check boxes etc. The spreadsheet is a variation on the Form Fill-in interaction style. Even today, there are quite a few computers are still purely forms-based in the industry, like cash registers, financial systems, stock control systems, and so on. The main reason is because the Fill-In-The-Blanks interface is especially useful for routine, clerical work or those tasks require a great amount of data entry.&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Simplifies data entry&lt;br /&gt;
* Minimal training - Shortens learning in that the fields are predefined and need only be 'recognized'.&lt;br /&gt;
* Gives convenient assistance - Guides the user via the predefined rules&lt;br /&gt;
* Permits use of form-management tools&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Screen space consuming&lt;br /&gt;
* requires more keystrokes&lt;br /&gt;
* requires handling typing errors (bad for users with poor typing skills)&lt;br /&gt;
&lt;br /&gt;
== Command Line ==&lt;br /&gt;
&lt;br /&gt;
Command line is the earliest used interaction style and is still seen predominantly in Unix operating systems though still usable to varying degrees on Windows and OSX. This style is mainly used by expert users by typing into a prompt that allows them to quickly execute commands. Unfortunately command line places a considerable burden on the user to learn and recall commands from memory. It is often the case that commands take parameters as well and most of the added benefits (mainly in the way of efficiency) come from using them. This leads to an unfriendly environment for both novice and intermediate users that may attempt to use this style. The large overhead in learning commands and minimal help for the user leaves this style almost exclusively in the domain of the expert user.&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* quick and powerful for experienced users&lt;br /&gt;
* user-controlled interaction&lt;br /&gt;
* minimal amount of typing (no mouse use)&lt;br /&gt;
* can be used in conjunction with other user interfaces&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* little or no prompting&lt;br /&gt;
* requires user’s knowledge of system, programs&lt;br /&gt;
* relies on recall of commands and syntax&lt;br /&gt;
* difficult to learn&lt;br /&gt;
* error prone&lt;br /&gt;
&lt;br /&gt;
== Natural Language ==&lt;br /&gt;
Natural Language is an interaction style which allows the user to communicate with their computer through a series of spoken commands, similar to how one may issue spoken commands to another person. However the benefits and applicability of Natural Language systems thus far is very limited, largely due to the imprecise and verbose nature of spoken languages. A major issue with using spoken language is that to communicate with computer systems the vocabulary would need to be limited to a specific subset of a full natural language, in order to both reduce ambiguity and keep processing time within reasonable bounds. One solution to the ambiguity of spoken languages is to utilize gestural language, which is considered at least as natural as verbal language. At the same time, the definition of what makes a natural language is very important. It is not as though humans are born knowing spoken word or gestures; a natural language is simply one which can be grasped fluently by the time one is required to draw upon it. A language could be considered natural, if upon approaching a computer the typical user already possesses language skills adequate for communicating desired concepts in a fluent and articulate manner. So in a sense Natural Language could involve a kind of language humans develop with the sole purpose of communicating with computer systems, thus potentially eliminating the ambiguities of the current natural spoken languages. Thus far however Natural Language has not seen widespread use, and often requires each user to train the computer to recognize their own voice. Natural Language could be very useful for those with minimal keyboard skills, and once it more accurately interprets verbal commands may even see widespread use one day. &amp;lt;sup&amp;gt;[2][3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Allows users to communicate with their system naturally&lt;br /&gt;
* Can reduce or eliminate the need for keyboards, great for those with poor keyboard skills&lt;br /&gt;
* Once it is more accurate at interpreting speech, commands may be able to be spoken faster than they are typed&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Currently cannot accurately interpret much of verbal language, which is too ambiguous&lt;br /&gt;
* Requires a lot of training for each user so it can interpret their verbal commands&lt;br /&gt;
&lt;br /&gt;
= See also =&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
# Mads Soegaard, &amp;quot;Interaction Styles&amp;quot;, interaction-design.org, http://www.interaction-design.org/encyclopedia/interaction_styles.html&lt;br /&gt;
# Byron Long, &amp;quot;Natural Language as an Interaction Style&amp;quot;, Retrieved on November 21st, 2009 from http://www.dgp.toronto.edu/people/byron/papers/nli.html&lt;br /&gt;
# Bill Buxton, &amp;quot;The &amp;quot;Natural&amp;quot; Language of Interaction&amp;quot;, Retrieved on November 21st, 2009 from http://www.billbuxton.com/natural.html&lt;br /&gt;
&lt;br /&gt;
= External links =&lt;br /&gt;
&lt;br /&gt;
--[[User:Shensw|Shensw]] 22:55, 20 November 2009 (EST)&lt;br /&gt;
&lt;br /&gt;
--[[User:Collim|Collim]] 23:50, 21 November 2009 (EST)&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 00:58, 22 November 2009 (EST)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles</id>
		<title>Five Interaction Styles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles"/>
				<updated>2009-11-22T03:43:09Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;Hopefully this well help to make the headings pop a little more&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''Five Interaction Styles'''&lt;br /&gt;
&lt;br /&gt;
= Shneiderman's Five Interaction Styles =&lt;br /&gt;
&lt;br /&gt;
== Visual representation ==&lt;br /&gt;
&lt;br /&gt;
== Menus ==&lt;br /&gt;
&lt;br /&gt;
== Fill-In-The-Blanks ==&lt;br /&gt;
[[Image:formfillin1.gif|thumb|300px|right|Classic Fill-In-The-Blanks]]&lt;br /&gt;
[[Image:formfillin2.gif|thumb|300px|right|Modern-day Fill-In-The-Blanks]]&lt;br /&gt;
The Fill-In-The-Blanks interaction style (also known as &amp;quot;Form Fill-in&amp;quot;) is best suited to data input, which was aimed at a different set of users than command language, specially non-experts users. Originally Fill-In-The-Blanks is to arrange one or more fields in the form of a prose sentence or phrase, with the fields as &amp;quot;blanks&amp;quot; to be filled in by the user. The TAB-key was designed and is still being used to switch between the fields and ENTER to submit the form. Therefore a pointing device (such as a mouse) was not really needed at that time. However it's very common to mix forms with other interaction styles in software design, such as drop down menus, check boxes etc. The spreadsheet is a variation on the Form Fill-in interation style. Even today, there are quite a few computers are still purely forms-based in the industry, like cash registers, financial systems, stock control systems, and so on. The main reason is because the Fill-In-The-Blanks interface is especially useful for routine, clerical work or those tasks require a great amount of data entry.&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Simplifies data entry&lt;br /&gt;
* Minimal training - Shortens learning in that the fields are predefined and need only be 'recognised'.&lt;br /&gt;
* Gives convenient assistance - Guides the user via the predefined rules&lt;br /&gt;
* Permits use of form-management tools&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Screen space consuming&lt;br /&gt;
* requires more keystrokes&lt;br /&gt;
* requires handling typing errors (bad for users with poor typing skills)&lt;br /&gt;
&lt;br /&gt;
== Command Prompt ==&lt;br /&gt;
&lt;br /&gt;
== Natural Language ==&lt;br /&gt;
Natural Language is an interaction style which allows the user to communicate with their computer through a series of spoken commands, similar to how one may issue spoken commands to another person. However the benefits and applicability of Natural Language systems thus far is very limited, largely due to the imprecise and verbose nature of spoken languages. A major issue with using spoken language is that to communicate with computer systems the vocabulary would need to be limited to a specific subset of a full natural language, in order to both reduce ambiguity and keep processing time within reasonable bounds. One solution to the ambiguity of spoken languages is to utilize gestural language, which is considered at least as natural as verbal language. At the same time, the definition of what makes a natural language is very important. It is not as though humans are born knowing spoken word or gestures; a natural language is simply one which can be grasped fluently by the time one is required to draw upon it. A language could be considered natural, if upon approaching a computer the typical user already possesses language skills adequate for communicating desired concepts in a fluent and articulate manner. So in a sense Natural Language could involve a kind of language humans develop with the sole purpose of communicating with computer systems, thus potentially eliminating the ambiguities of the current natural spoken languages. Thus far however Natural Language has not seen widespread use, and often requires each user to train the computer to recognize their own voice. Natural Language could be very useful for those with minimal keyboard skills, and once it more accurately interprets verbal commands may even see widespread use one day. &amp;lt;sup&amp;gt;[2][3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== + Advantages ===&lt;br /&gt;
* Allows users to communicate with their system naturally&lt;br /&gt;
* Can reduce or eliminate the need for keyboards, great for those with poor keyboard skills&lt;br /&gt;
* Once it is more accurate at interpreting speech, commands may be able to be spoken faster than they are typed&lt;br /&gt;
&lt;br /&gt;
=== - Disadvantages ===&lt;br /&gt;
* Currently cannot accurately interpret much of verbal language, which is too ambiguous&lt;br /&gt;
* Requires a lot of training for each user so it can interpret their verbal commands&lt;br /&gt;
&lt;br /&gt;
= See also =&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
# Mads Soegaard, &amp;quot;Interaction Styles&amp;quot;, interaction-design.org, http://www.interaction-design.org/encyclopedia/interaction_styles.html&lt;br /&gt;
# Byron Long, &amp;quot;Natural Language as an Interaction Style&amp;quot;, Retrieved on November 21st, 2009 from http://www.dgp.toronto.edu/people/byron/papers/nli.html&lt;br /&gt;
# Bill Buxton, &amp;quot;The &amp;quot;Natural&amp;quot; Language of Interaction&amp;quot;, Retrieved on November 21st, 2009 from http://www.billbuxton.com/natural.html&lt;br /&gt;
&lt;br /&gt;
= External links =&lt;br /&gt;
&lt;br /&gt;
--[[User:Shensw|Shensw]] 22:55, 20 November 2009 (EST)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/The_Five_Interaction_Styles</id>
		<title>The Five Interaction Styles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/The_Five_Interaction_Styles"/>
				<updated>2009-11-20T05:56:15Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;The Five Interaction Styles moved to Five Interaction Styles: 'The' shouldn't be in wiki titles&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Five Interaction Styles]]&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles</id>
		<title>Five Interaction Styles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles"/>
				<updated>2009-11-20T05:56:15Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;The Five Interaction Styles moved to Five Interaction Styles: 'The' shouldn't be in wiki titles&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''five interaction styles'''&lt;br /&gt;
&lt;br /&gt;
== Shneiderman's five interaction styles ==&lt;br /&gt;
&lt;br /&gt;
=== Visual representation ===&lt;br /&gt;
&lt;br /&gt;
=== Menus ===&lt;br /&gt;
&lt;br /&gt;
===Fill-In-The-Blanks ===&lt;br /&gt;
&lt;br /&gt;
=== Command Prompt ===&lt;br /&gt;
&lt;br /&gt;
=== Natural Language ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles</id>
		<title>Five Interaction Styles</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Five_Interaction_Styles"/>
				<updated>2009-11-20T05:42:05Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;Added headings for content&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The '''five interaction styles'''&lt;br /&gt;
&lt;br /&gt;
== Shneiderman's five interaction styles ==&lt;br /&gt;
&lt;br /&gt;
=== Visual representation ===&lt;br /&gt;
&lt;br /&gt;
=== Menus ===&lt;br /&gt;
&lt;br /&gt;
===Fill-In-The-Blanks ===&lt;br /&gt;
&lt;br /&gt;
=== Command Prompt ===&lt;br /&gt;
&lt;br /&gt;
=== Natural Language ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T22:29:42Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
Goals of the attacks:&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;flood&amp;quot; a network which will prevent legitimate network traffic&lt;br /&gt;
* disrupt connections between two machines, which will prevent access to a service&lt;br /&gt;
* disrupt the service given to a particular system or person &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
There are two basic ways that [[ICMP]] is used to deny service. The first is by flooding the target with [[ping]] messages until they are overwhelmed by trying to send responses and are slowed down. This can be done in either a very simple way that's only requirement is that you have more bandwidth than the target you are attacking or in a more complex way such as [[Smurfing]] or the Smurf Attack which exploits poorly configured network devices allow packets to be sent to all other hosts on a network using the broadcast address. The other way is called a often called a nuke and the most popular example is called the [http://en.wikipedia.org/wiki/Ping_of_death Ping of Death] which sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to target. Because of the size of the packet the target  cannot reassemble them. This often causes the system to crash as a result. &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== TCP SYN Flood Attack ===&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transmission_Control_Protocol Transmission Control Protocol] connection request packets can be used to attack a target machine by causing the target to create half-open connections and reserve all of the ports on the machine. This is done by attempting to create a regular connection with the target, but never returning anything back to them after they have sent the SYN-ACK packet. Since the process of opening a TCP connect is a three-way handshake this will stall the process while waiting for confirmation from the attacker. Unlike an ICMP flood this attack does not depend on having more bandwidth than the target because there is a relatively small number of ports that have to be reserved.&amp;lt;sup&amp;gt;[1,2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
DoS attacks are not limited to only a server scale. Individual applications on a users machine are also prone to attack depending on the software. [http://en.wikipedia.org/wiki/IRC IRC] is a very common example of where the various types of attacks used on servers can be seen on a smaller scale. These can include exploits such as buffer overflow which can cause software to get confused and fill disk space or consume all available memory or CPU time. As well as the more common types of attack such as flooding.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
[[Image:DOS_Model.gif|thumb|right|400px|The three main types of DoS attack]]&lt;br /&gt;
&lt;br /&gt;
A distributed denial of service attack (DDoS) is a much more powerful form of the traditional DoS attack. In this form of the attack multiple compromised computers (also known as slaves) are used to proform the attacks noted above. Capturing the computers to do such an attack is done through viruses and malware. Both may be designed so that all of the machines are triggered at a specific date and time. Alternatively the master system could have has more specific and varied control over them. There are many DDoS tools that can be used to both run through lists of exploits to aquire new slaves as well as to control the slaves. A collected group of compermised computers are often called [[Bots &amp;amp; Botnets]]. Stacheldraht is a classic example of a control program that may be used to control multiple master systems at once which in turn control all of the slaved machines. &amp;lt;sup&amp;gt;[8]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The primary difference and advantage of DDoS is that DoS only makes use of one computer while DDoS uses many computer to complete a task. Because so many more computers are involved these attacks can be much harder to stop and also harder to detect because more focus can be put on staying hidden instead of getting the maxium power out of a single machine. They attacks are also much more powerful and often involve hundreds or even thousands of computers.&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
As certain websites on the Internet grew more popular a relatively interesting phenomena started to develop in which websites were unintentionally being attacked by huge spikes in popularity. It is almost always the case that when big and often very popular sites link to small, unknown websites these sites cannot handle all of the extra traffic and end up under a denial of service like effect. [http://www.digg.com Digg], [http://www.slashdot.org Slashdot] and [http://www.fark.com Fark] are prime examples of websites that's only goal is to increase the popularity of other websites and they have gained a reputation for their own related &amp;quot;effects&amp;quot; when any website is posted on them.&lt;br /&gt;
&lt;br /&gt;
Unintentional attacks are not limited to popularity. Routes such as D-Link and Netgear also have a history of flooding [http://en.wikipedia.org/wiki/Network_Time_Protocol Network Time Protocol] servers without the intention of the owner of the router.&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
Common firewalls are not well suited to handle DoS attacks except by taking extreme measures. It does not take a very sophisticated defense to simply drop certain types of packets that are received. The Linux command iptables can be used to manually set the firewall rules that would partially protect a system from a DoS attack. An issue with extreme measures like blocking ICMP messages so that you are not vulnerable to ICMP flooding is that you losing a lot of functionality that comes with the protocol. This could be taken to an extreme of crippling a system by not allowing TCP or UDP packets to reach it. Even by taking steps to limit traffic other areas may still be left vulnerable most notably routers leading to the system.&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A few modern firewalls such as [http://en.wikipedia.org/wiki/Cisco_PIX Cisco PIX] have taken steps to help differentiate between good TCP traffic and malicious traffic.&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
Most switches and routers have some options in limiting the amount of information that is allowed through device and access control list features. For switches this may include automatic traffic limiting, delayed binding when dealing with TCP, deep packet inspection and the ability to identify bogus IP addresses. The obvious disadvantage to having many features like this turned on is that the router or switch takes a large performance hit since each packet has to be closely inspected before it is allowed past.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Tools for conducting denial-of-service attacks]]&lt;br /&gt;
* [[Internet Control Message Protocol]]&lt;br /&gt;
* [[ping]]&lt;br /&gt;
* [[Smurfing]]&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# [http://anml.iu.edu/ddos/types.html Types of DDoS Attacks]. Retrieved April 11, 2009&lt;br /&gt;
# [http://www.cert.org/tech_tips/denial_of_service.html CERT/CC Denial of Service]. Retrieved April 11, 2009&lt;br /&gt;
# Mullen, Ruth. [http://www.irchelp.org/irchelp/mirc/flood.html Flood Protection and Ignoring People]. Retrieved April 11, 2009&lt;br /&gt;
# &amp;quot;Simple Nomad&amp;quot;, [http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html Strategies for Defeating Distributed Attacks]. Retrieved April 11, 2009&lt;br /&gt;
# Parks, J. (2008, August 25). [http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&amp;amp;id=1439320 DDoS Attack Prevention - The Best Medicine]. Retrieved April 12, 2009&lt;br /&gt;
# Plonka, Dave. (August 21, 2003). [http://pages.cs.wisc.edu/~plonka/netgear-sntp/ Flawed Routers Flood University of Wisconsin Internet Time Server]. Retrieved April 12, 2009&lt;br /&gt;
# Manzano, Yanet. [http://www.acm.org/crossroads/xrds10-1/tracingDOS.html Tracing the Development of Denial of Service Attacks: A Corporate Analogy]. Retrieved April 12, 2009&lt;br /&gt;
# Dittrich, David. [http://staff.washington.edu/dittrich/misc/stacheldraht.analysis The &amp;quot;stacheldraht&amp;quot; distributed denial of service attack tool]. Retrieved April 12, 2009&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:59, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T21:59:49Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
Goals of the attacks:&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;flood&amp;quot; a network which will prevent legitimate network traffic&lt;br /&gt;
* disrupt connections between two machines, which will prevent access to a service&lt;br /&gt;
* disrupt the service given to a particular system or person &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
There are two basic ways that [[ICMP]] is used to deny service. The first is by flooding the target with [[ping]] messages until they are overwhelmed by trying to send responses and are slowed down. This can be done in either a very simple way that's only requirement is that you have more bandwidth than the target you are attacking or in a more complex way such as [[Smurfing]] or the Smurf Attack which exploits poorly configured network devices allow packets to be sent to all other hosts on a network using the broadcast address. The other way is called a often called a nuke and the most popular example is called the [http://en.wikipedia.org/wiki/Ping_of_death Ping of Death] which sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to target. Because of the size of the packet the target  cannot reassemble them. This often causes the system to crash as a result. &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== TCP SYN Flood Attack ===&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transmission_Control_Protocol Transmission Control Protocol] connection request packets can be used to attack a target machine by causing the target to create half-open connections and reserve all of the ports on the machine. This is done by attempting to create a regular connection with the target, but never returning anything back to them after they have sent the SYN-ACK packet. Since the process of opening a TCP connect is a three-way handshake this will stall the process while waiting for confirmation from the attacker. Unlike an ICMP flood this attack does not depend on having more bandwidth than the target because there is a relatively small number of ports that have to be reserved.&amp;lt;sup&amp;gt;[1,2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
DoS attacks are not limited to only a server scale. Individual applications on a users machine are also prone to attack depending on the software. [http://en.wikipedia.org/wiki/IRC IRC] is a very common example of where the various types of attacks used on servers can be seen on a smaller scale. These can include exploits such as buffer overflow which can cause software to get confused and fill disk space or consume all available memory or CPU time. As well as the more common types of attack such as flooding.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
[[Image:DOS_Model.gif|thumb|right|400px|The three main types of DoS attack]]&lt;br /&gt;
&lt;br /&gt;
A distributed denial of service attack (DDoS) is a much more powerful form of the traditional DoS attack. In this form of the attack multiple compromised computers (also known as slaves) are used to proform the attacks noted above. Capturing the computers to do such an attack is done through viruses and malware. Both may be designed so that all of the machines are triggered at a specific date and time. Alternatively the master system could have has more specific and varied control over them. There are many DDoS tools that can be used to both run through lists of exploits to aquire new slaves as well as to control the slaves. A collected group of compermised computers are often called [[Bots &amp;amp; Botnets]]. Stacheldraht is a classic example of a control program that may be used to control multiple master systems at once which in turn control all of the slaved machines. &amp;lt;sup&amp;gt;[8]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The primary difference and advantage of DDoS is that DoS only makes use of one computer while DDoS uses many computer to complete a task. Because so many more computers are involved these attacks can be much harder to stop and also harder to detect because more focus can be put on staying hidden instead of getting the maxium power out of a single machine. They attacks are also much more powerful and often involve hundreds or even thousands of computers.&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
As certain websites on the Internet grew more popular a relatively interesting phenomena started to develop in which websites were unintentionally being attacked by huge spikes in popularity. It is almost always the case that when big and often very popular sites link to small, unknown websites these sites cannot handle all of the extra traffic and end up under a denial of service like effect. [http://www.digg.com Digg], [http://www.slashdot.org Slashdot] and [http://www.fark.com Fark] are prime examples of websites that's only goal is to increase the popularity of other websites and they have gained a reputation for their own related &amp;quot;effects&amp;quot; when any website is posted on them.&lt;br /&gt;
&lt;br /&gt;
Unintentional attacks are not limited to popularity. Routes such as D-Link and Netgear also have a history of flooding [http://en.wikipedia.org/wiki/Network_Time_Protocol Network Time Protocol] servers without the intention of the owner of the router.&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
Common firewalls are not well suited to handle DoS attacks except by taking extreme measures. It does not take a very sophisticated defense to simply drop certain types of packets that are received. The Linux command iptables can be used to manually set the firewall rules that would partially protect a system from a DoS attack. An issue with extreme measures like blocking ICMP messages so that you are not vulnerable to ICMP flooding is that you losing a lot of functionality that comes with the protocol. This could be taken to an extreme of crippling a system by not allowing TCP or UDP packets to reach it. Even by taking steps to limit traffic other areas may still be left vulnerable most notably routers leading to the system.&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A few modern firewalls such as [http://en.wikipedia.org/wiki/Cisco_PIX Cisco PIX] have taken steps to help differentiate between good TCP traffic and malicious traffic.&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
Most switches and routers have some options in limiting the amount of information that is allowed through device and access control list features. For switches this may include automatic traffic limiting, delayed binding when dealing with TCP, deep packet inspection and the ability to identify bogus IP addresses. The obvious disadvantage to having many features like this turned on is that the router or switch takes a large performance hit since each packet has to be closely inspected before it is allowed past.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Tools for conducting denial-of-service attacks]]&lt;br /&gt;
* [[Internet Control Message Protocol]]&lt;br /&gt;
* [[ping]]&lt;br /&gt;
* [[Smurfing]]&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks. Retrieved April 11, 2009, from http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# CERT/CC Denial of Service. Retrieved April 11, 2009, from http://www.cert.org/tech_tips/denial_of_service.html&lt;br /&gt;
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, from http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# &amp;quot;Simple Nomad&amp;quot;, Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, from http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&amp;amp;id=1439320&lt;br /&gt;
# Plonka, Dave. (August 21, 2003). Flawed Routers Flood University of Wisconsin Internet Time Server. Retrieved April 12, 2009, from http://pages.cs.wisc.edu/~plonka/netgear-sntp/&lt;br /&gt;
# Manzano, Yanet. Tracing the Development of Denial of Service Attacks: A Corporate Analogy. Retrieved April 12, 2009, from http://www.acm.org/crossroads/xrds10-1/tracingDOS.html&lt;br /&gt;
# Dittrich, David. The &amp;quot;stacheldraht&amp;quot; distributed denial of service attack tool. Retrieved April 12, 2009, from http://staff.washington.edu/dittrich/misc/stacheldraht.analysis&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:59, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T21:59:08Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
Goals of the attacks:&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;flood&amp;quot; a network which will prevent legitimate network traffic&lt;br /&gt;
* disrupt connections between two machines, which will prevent access to a service&lt;br /&gt;
* disrupt the service given to a particular system or person &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
There are two basic ways that [[ICMP]] is used to deny service. The first is by flooding the target with [[ping]] messages until they are overwhelmed by trying to send responses and are slowed down. This can be done in either a very simple way that's only requirement is that you have more bandwidth than the target you are attacking or in a more complex way such as [[Smurfing]] or the Smurf Attack which exploits poorly configured network devices allow packets to be sent to all other hosts on a network using the broadcast address. The other way is called a often called a nuke and the most popular example is called the [http://en.wikipedia.org/wiki/Ping_of_death Ping of Death] which sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to target. Because of the size of the packet the target  cannot reassemble them. This often causes the system to crash as a result. &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== TCP SYN Flood Attack ===&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transmission_Control_Protocol Transmission Control Protocol] connection request packets can be used to attack a target machine by causing the target to create half-open connections and reserve all of the ports on the machine. This is done by attempting to create a regular connection with the target, but never returning anything back to them after they have sent the SYN-ACK packet. Since the process of opening a TCP connect is a three-way handshake this will stall the process while waiting for confirmation from the attacker. Unlike an ICMP flood this attack does not depend on having more bandwidth than the target because there is a relatively small number of ports that have to be reserved.&amp;lt;sup&amp;gt;[1,2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
DoS attacks are not limited to only a server scale. Individual applications on a users machine are also prone to attack depending on the software. [http://en.wikipedia.org/wiki/IRC IRC] is a very common example of where the various types of attacks used on servers can be seen on a smaller scale. These can include exploits such as buffer overflow which can cause software to get confused and fill disk space or consume all available memory or CPU time. As well as the more common types of attack such as flooding.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
[[Image:DOS_Model.gif|thumb|right|400px|The three main types of DoS attack]]&lt;br /&gt;
&lt;br /&gt;
A distributed denial of service attack (DDoS) is a much more powerful form of the traditional DoS attack. In this form of the attack multiple compromised computers (also known as slaves) are used to proform the attacks noted above. Capturing the computers to do such an attack is done through viruses and malware. Both may be designed so that all of the machines are triggered at a specific date and time. Alternatively the master system could have has more specific and varied control over them. There are many DDoS tools that can be used to both run through lists of exploits to aquire new slaves as well as to control the slaves. A collected group of compermised computers are often called [[Bots &amp;amp; Botnets]]. Stacheldraht is a classic example of a control program that may be used to control multiple master systems at once which in turn control all of the slaved machines. &amp;lt;sup&amp;gt;[8]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The primary difference and advantage of DDoS is that DoS only makes use of one computer while DDoS uses many computer to complete a task. Because so many more computers are involved these attacks can be much harder to stop and also harder to detect because more focus can be put on staying hidden instead of getting the maxium power out of a single machine. They attacks are also much more powerful and often involve hundreds or even thousands of computers.&amp;lt;sup&amp;gt;[7]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
As certain websites on the Internet grew more popular a relatively interesting phenomena started to develop in which websites were unintentionally being attacked by huge spikes in popularity. It is almost always the case that when big and often very popular sites link to small, unknown websites these sites cannot handle all of the extra traffic and end up under a denial of service like effect. [http://www.digg.com Digg], [http://www.slashdot.org Slashdot] and [http://www.fark.com Fark] are prime examples of websites that's only goal is to increase the popularity of other websites and they have gained a reputation for their own related &amp;quot;effects&amp;quot; when any website is posted on them.&lt;br /&gt;
&lt;br /&gt;
Unintentional attacks are not limited to popularity. Routes such as D-Link and Netgear also have a history of flooding [http://en.wikipedia.org/wiki/Network_Time_Protocol Network Time Protocol] servers without the intention of the owner of the router.&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
Common firewalls are not well suited to handle DoS attacks except by taking extreme measures. It does not take a very sophisticated defense to simply drop certain types of packets that are received. The Linux command iptables can be used to manually set the firewall rules that would partially protect a system from a DoS attack. An issue with extreme measures like blocking ICMP messages so that you are not vulnerable to ICMP flooding is that you losing a lot of functionality that comes with the protocol. This could be taken to an extreme of crippling a system by not allowing TCP or UDP packets to reach it. Even by taking steps to limit traffic other areas may still be left vulnerable most notably routers leading to the system.&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A few modern firewalls such as [http://en.wikipedia.org/wiki/Cisco_PIX Cisco PIX] have taken steps to help differentiate between good TCP traffic and malicious traffic.&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
Most switches and routers have some options in limiting the amount of information that is allowed through device and access control list features. For switches this may include automatic traffic limiting, delayed binding when dealing with TCP, deep packet inspection and the ability to identify bogus IP addresses. The obvious disadvantage to having many features like this turned on is that the router or switch takes a large performance hit since each packet has to be closely inspected before it is allowed past.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Tools for conducting denial-of-service attacks]]&lt;br /&gt;
* [[Internet Control Message Protocol]]&lt;br /&gt;
* [[ping]]&lt;br /&gt;
* [[Smurfing]]&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks. Retrieved April 11, 2009, from http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# CERT/CC Denial of Service. Retrieved April 11, 2009, from http://www.cert.org/tech_tips/denial_of_service.html&lt;br /&gt;
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, from http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# &amp;quot;Simple Nomad&amp;quot;, Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, from http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&amp;amp;id=1439320&lt;br /&gt;
# Plonka, Dave. (August 21, 2003). Flawed Routers Flood University of Wisconsin Internet Time Server. Retrieved April 12, 2009, from http://pages.cs.wisc.edu/~plonka/netgear-sntp/&lt;br /&gt;
# Manzano, Yanet. Tracing the Development of Denial of Service Attacks: A Corporate Analogy. Retrieved April 12, 2009, from http://www.acm.org/crossroads/xrds10-1/tracingDOS.html&lt;br /&gt;
# Dittrich, David. The &amp;quot;stacheldraht&amp;quot; distributed denial of service attack tool. Retrieved April 12, 2009, from http://staff.washington.edu/dittrich/misc/stacheldraht.analysis&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T21:07:30Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;/* Firewalls */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
Goals of the attacks:&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;flood&amp;quot; a network which will prevent legitimate network traffic&lt;br /&gt;
* disrupt connections between two machines, which will prevent access to a service&lt;br /&gt;
* disrupt the service given to a particular system or person &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
There are two basic ways that [[ICMP]] is used to deny service. The first is by flooding the target with [[ping]] messages until they are overwhelmed by trying to send responses and are slowed down. This can be done in either a very simple way that's only requirement is that you have more bandwidth than the target you are attacking or in a more complex way such as [[Smurfing]] or the Smurf Attack which exploits poorly configured network devices allow packets to be sent to all other hosts on a network using the broadcast address. The other way is called a often called a nuke and the most popular example is called the [http://en.wikipedia.org/wiki/Ping_of_death Ping of Death] which sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to target. Because of the size of the packet the target  cannot reassemble them. This often causes the system to crash as a result. &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== TCP SYN Flood Attack ===&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transmission_Control_Protocol Transmission Control Protocol] connection request packets can be used to attack a target machine by causing the target to create half-open connections and reserve all of the ports on the machine. This is done by attempting to create a regular connection with the target, but never returning anything back to them after they have sent the SYN-ACK packet. Since the process of opening a TCP connect is a three-way handshake this will stall the process while waiting for confirmation from the attacker. Unlike an ICMP flood this attack does not depend on having more bandwidth than the target because there is a relatively small number of ports that have to be reserved.&amp;lt;sup&amp;gt;[1,2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
DoS attacks are not limited to only a server scale. Individual applications on a users machine are also prone to attack depending on the software. [http://en.wikipedia.org/wiki/IRC IRC] is a very common example of where the various types of attacks used on servers can be seen on a smaller scale. These can include exploits such as buffer overflow which can cause software to get confused and fill disk space or consume all available memory or CPU time. As well as the more common types of attack such as flooding.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
[[Image:DOS_Model.gif|thumb|right|400px|The three main types of DoS attack]]&lt;br /&gt;
&lt;br /&gt;
Distributed DoS attacks etc.&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
As certain websites on the Internet grew more popular a relatively interesting phenomena started to develop in which websites were unintentionally being attacked by huge spikes in popularity. It is almost always the case that when big and often very popular sites link to small, unknown websites these sites cannot handle all of the extra traffic and end up under a denial of service like effect. [http://www.digg.com Digg], [http://www.slashdot.org Slashdot] and [http://www.fark.com Fark] are prime examples of websites that's only goal is to increase the popularity of other websites and they have gained a reputation for their own related &amp;quot;effects&amp;quot; when any website is posted on them.&lt;br /&gt;
&lt;br /&gt;
Unintentional attacks are not limited to popularity. Routes such as D-Link and Netgear also have a history of flooding [http://en.wikipedia.org/wiki/Network_Time_Protocol Network Time Protocol] servers without the intention of the owner of the router.&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
Common firewalls are not well suited to handle DoS attacks except by taking extreme measures. It does not take a very sophisticated defense to simply drop certain types of packets that are received. The Linux command iptables can be used to manually set the firewall rules that would partially protect a system from a DoS attack. An issue with extreme measures like blocking ICMP messages so that you are not vulnerable to ICMP flooding is that you losing a lot of functionality that comes with the protocol. This could be taken to an extreme of crippling a system by not allowing TCP or UDP packets to reach it. Even by taking steps to limit traffic other areas may still be left vulnerable most notably routers leading to the system.&amp;lt;sup&amp;gt;[4]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A few modern firewalls such as [http://en.wikipedia.org/wiki/Cisco_PIX Cisco PIX] have taken steps to help differentiate between good TCP traffic and malicious traffic.&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
Most switches and routers have some options in limiting the amount of information that is allowed through device and access control list features. For switches this may include automatic traffic limiting, delayed binding when dealing with TCP, deep packet inspection and the ability to identify bogus IP addresses. The obvious disadvantage to having many features like this turned on is that the router or switch takes a large performance hit since each packet has to be closely inspected before it is allowed past.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Tools for conducting denial-of-service attacks]]&lt;br /&gt;
* [[Internet Control Message Protocol]]&lt;br /&gt;
* [[ping]]&lt;br /&gt;
* [[Smurfing]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks. Retrieved April 11, 2009, from http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# CERT/CC Denial of Service. Retrieved April 11, 2009, from http://www.cert.org/tech_tips/denial_of_service.html&lt;br /&gt;
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, from http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# &amp;quot;Simple Nomad&amp;quot;, Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, from http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&amp;amp;id=1439320&lt;br /&gt;
# Plonka, Dave. (August 21, 2003). Flawed Routers Flood University of Wisconsin Internet Time Server. Retrieved April 12, 2009, from http://pages.cs.wisc.edu/~plonka/netgear-sntp/&lt;br /&gt;
# Manzano, Yanet. Tracing the Development of Denial of Service Attacks: A Corporate Analogy. Retrieved April 12, 2009, from http://www.acm.org/crossroads/xrds10-1/tracingDOS.html&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T20:17:12Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;/* Distributed attack */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
Goals of the attacks:&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;flood&amp;quot; a network which will prevent legitimate network traffic&lt;br /&gt;
* disrupt connections between two machines, which will prevent access to a service&lt;br /&gt;
* disrupt the service given to a particular system or person &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
There are two basic ways that [[ICMP]] is used to deny service. The first is by flooding the target with [[ping]] messages until they are overwhelmed by trying to send responses and are slowed down. This can be done in either a very simple way that's only requirement is that you have more bandwidth than the target you are attacking or in a more complex way such as [[Smurfing]] or the Smurf Attack which exploits poorly configured network devices allow packets to be sent to all other hosts on a network using the broadcast address. The other way is called a often called a nuke and the most popular example is called the [http://en.wikipedia.org/wiki/Ping_of_death Ping of Death] which sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to target. Because of the size of the packet the target  cannot reassemble them. This often causes the system to crash as a result. &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== TCP SYN Flood Attack ===&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transmission_Control_Protocol Transmission Control Protocol] connection request packets can be used to attack a target machine by causing the target to create half-open connections and reserve all of the ports on the machine. This is done by attempting to create a regular connection with the target, but never returning anything back to them after they have sent the SYN-ACK packet. Since the process of opening a TCP connect is a three-way handshake this will stall the process while waiting for confirmation from the attacker. Unlike an ICMP flood this attack does not depend on having more bandwidth than the target because there is a relatively small number of ports that have to be reserved.&amp;lt;sup&amp;gt;[1,2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
DoS attacks are not limited to only a server scale. Individual applications on a users machine are also prone to attack depending on the software. [http://en.wikipedia.org/wiki/IRC IRC] is a very common example of where the various types of attacks used on servers can be seen on a smaller scale. These can include exploits such as buffer overflow which can cause software to get confused and fill disk space or consume all available memory or CPU time. As well as the more common types of attack such as flooding.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
[[Image:DOS_Model.gif|thumb|right|400px|The three main types of DoS attack]]&lt;br /&gt;
&lt;br /&gt;
Distributed DoS attacks etc.&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
As certain websites on the Internet grew more popular a relatively interesting phenomena started to develop in which websites were unintentionally being attacked by huge spikes in popularity. It is almost always the case that when big and often very popular sites link to small, unknown websites these sites cannot handle all of the extra traffic and end up under a denial of service like effect. [http://www.digg.com Digg], [http://www.slashdot.org Slashdot] and [http://www.fark.com Fark] are prime examples of websites that's only goal is to increase the popularity of other websites and they have gained a reputation for their own related &amp;quot;effects&amp;quot; when any website is posted on them.&lt;br /&gt;
&lt;br /&gt;
Unintentional attacks are not limited to popularity. Routes such as D-Link and Netgear also have a history of flooding [http://en.wikipedia.org/wiki/Network_Time_Protocol Network Time Protocol] servers without the intention of the owner of the router.&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
Common firewalls are not well suited to handle DoS attacks except by taking extreme measures. It does not take a very sophisticated defense to simply drop certain types of packets that are received. The Linux command iptables can be used to manually set the firewall rules that would partially protect a system from a DoS attack. An issue with extreme measures like blocking ICMP messages so that you are not vulnerable to ICMP flooding is that you losing a lot of functionality that comes with the protocol. This could be taken to an extreme of crippling a system by not allowing TCP or UDP packets to reach it. Even by taking steps to limit traffic other areas may still be left vulnerable most notably routers leading to the system.&lt;br /&gt;
&lt;br /&gt;
A few modern firewalls such as [http://en.wikipedia.org/wiki/Cisco_PIX Cisco PIX] have taken steps to help differentiate between good TCP traffic and malicious traffic.&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
Most switches and routers have some options in limiting the amount of information that is allowed through device and access control list features. For switches this may include automatic traffic limiting, delayed binding when dealing with TCP, deep packet inspection and the ability to identify bogus IP addresses. The obvious disadvantage to having many features like this turned on is that the router or switch takes a large performance hit since each packet has to be closely inspected before it is allowed past.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Tools for conducting denial-of-service attacks]]&lt;br /&gt;
* [[Internet Control Message Protocol]]&lt;br /&gt;
* [[ping]]&lt;br /&gt;
* [[Smurfing]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks. Retrieved April 11, 2009, from http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# CERT/CC Denial of Service. Retrieved April 11, 2009, from http://www.cert.org/tech_tips/denial_of_service.html&lt;br /&gt;
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, from http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# &amp;quot;Simple Nomad&amp;quot;, Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, from http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&amp;amp;id=1439320&lt;br /&gt;
# Plonka, Dave. (August 21, 2003). Flawed Routers Flood University of Wisconsin Internet Time Server. Retrieved April 12, 2009, from http://pages.cs.wisc.edu/~plonka/netgear-sntp/&lt;br /&gt;
# Manzano, Yanet. Tracing the Development of Denial of Service Attacks: A Corporate Analogy. Retrieved April 12, 2009, from http://www.acm.org/crossroads/xrds10-1/tracingDOS.html&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:DOS_Model.gif</id>
		<title>File:DOS Model.gif</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:DOS_Model.gif"/>
				<updated>2009-04-12T20:12:51Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;The three main methods of Denial of Service. DoS, DDoS, and DRDoS.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The three main methods of Denial of Service. DoS, DDoS, and DRDoS.&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T20:10:41Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
Goals of the attacks:&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;flood&amp;quot; a network which will prevent legitimate network traffic&lt;br /&gt;
* disrupt connections between two machines, which will prevent access to a service&lt;br /&gt;
* disrupt the service given to a particular system or person &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
There are two basic ways that [[ICMP]] is used to deny service. The first is by flooding the target with [[ping]] messages until they are overwhelmed by trying to send responses and are slowed down. This can be done in either a very simple way that's only requirement is that you have more bandwidth than the target you are attacking or in a more complex way such as [[Smurfing]] or the Smurf Attack which exploits poorly configured network devices allow packets to be sent to all other hosts on a network using the broadcast address. The other way is called a often called a nuke and the most popular example is called the [http://en.wikipedia.org/wiki/Ping_of_death Ping of Death] which sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to target. Because of the size of the packet the target  cannot reassemble them. This often causes the system to crash as a result. &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== TCP SYN Flood Attack ===&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transmission_Control_Protocol Transmission Control Protocol] connection request packets can be used to attack a target machine by causing the target to create half-open connections and reserve all of the ports on the machine. This is done by attempting to create a regular connection with the target, but never returning anything back to them after they have sent the SYN-ACK packet. Since the process of opening a TCP connect is a three-way handshake this will stall the process while waiting for confirmation from the attacker. Unlike an ICMP flood this attack does not depend on having more bandwidth than the target because there is a relatively small number of ports that have to be reserved.&amp;lt;sup&amp;gt;[1,2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
DoS attacks are not limited to only a server scale. Individual applications on a users machine are also prone to attack depending on the software. [http://en.wikipedia.org/wiki/IRC IRC] is a very common example of where the various types of attacks used on servers can be seen on a smaller scale. These can include exploits such as buffer overflow which can cause software to get confused and fill disk space or consume all available memory or CPU time. As well as the more common types of attack such as flooding.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
As certain websites on the Internet grew more popular a relatively interesting phenomena started to develop in which websites were unintentionally being attacked by huge spikes in popularity. It is almost always the case that when big and often very popular sites link to small, unknown websites these sites cannot handle all of the extra traffic and end up under a denial of service like effect. [http://www.digg.com Digg], [http://www.slashdot.org Slashdot] and [http://www.fark.com Fark] are prime examples of websites that's only goal is to increase the popularity of other websites and they have gained a reputation for their own related &amp;quot;effects&amp;quot; when any website is posted on them.&lt;br /&gt;
&lt;br /&gt;
Unintentional attacks are not limited to popularity. Routes such as D-Link and Netgear also have a history of flooding [http://en.wikipedia.org/wiki/Network_Time_Protocol Network Time Protocol] servers without the intention of the owner of the router.&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
Common firewalls are not well suited to handle DoS attacks except by taking extreme measures. It does not take a very sophisticated defense to simply drop certain types of packets that are received. The Linux command iptables can be used to manually set the firewall rules that would partially protect a system from a DoS attack. An issue with extreme measures like blocking ICMP messages so that you are not vulnerable to ICMP flooding is that you losing a lot of functionality that comes with the protocol. This could be taken to an extreme of crippling a system by not allowing TCP or UDP packets to reach it. Even by taking steps to limit traffic other areas may still be left vulnerable most notably routers leading to the system.&lt;br /&gt;
&lt;br /&gt;
A few modern firewalls such as [http://en.wikipedia.org/wiki/Cisco_PIX Cisco PIX] have taken steps to help differentiate between good TCP traffic and malicious traffic.&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
Most switches and routers have some options in limiting the amount of information that is allowed through device and access control list features. For switches this may include automatic traffic limiting, delayed binding when dealing with TCP, deep packet inspection and the ability to identify bogus IP addresses. The obvious disadvantage to having many features like this turned on is that the router or switch takes a large performance hit since each packet has to be closely inspected before it is allowed past.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Tools for conducting denial-of-service attacks]]&lt;br /&gt;
* [[Internet Control Message Protocol]]&lt;br /&gt;
* [[ping]]&lt;br /&gt;
* [[Smurfing]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks. Retrieved April 11, 2009, from http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# CERT/CC Denial of Service. Retrieved April 11, 2009, from http://www.cert.org/tech_tips/denial_of_service.html&lt;br /&gt;
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, from http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# &amp;quot;Simple Nomad&amp;quot;, Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, from http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&amp;amp;id=1439320&lt;br /&gt;
# Plonka, Dave. (August 21, 2003). Flawed Routers Flood University of Wisconsin Internet Time Server. Retrieved April 12, 2009, from http://pages.cs.wisc.edu/~plonka/netgear-sntp/&lt;br /&gt;
# Manzano, Yanet. Tracing the Development of Denial of Service Attacks: A Corporate Analogy. Retrieved April 12, 2009, from http://www.acm.org/crossroads/xrds10-1/tracingDOS.html&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T18:57:43Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
Goals of the attacks:&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;flood&amp;quot; a network which will prevent legitimate network traffic&lt;br /&gt;
* disrupt connections between two machines, which will prevent access to a service&lt;br /&gt;
* disrupt the service given to a particular system or person &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
There are two basic ways that [[ICMP]] is used to deny service. The first is by flooding the target with [[ping]] messages until they are overwhelmed by trying to send responses and are slowed down. This can be done in either a very simple way that's only requirement is that you have more bandwidth than the target you are attacking or in a more complex way such as [[Smurfing]] or the Smurf Attack which exploits poorly configured network devices allow packets to be sent to all other hosts on a network using the broadcast address. The other way is called a often called a nuke and the most popular example is called the [http://en.wikipedia.org/wiki/Ping_of_death Ping of Death] which sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to target. Because of the size of the packet the target  cannot reassemble them. This often causes the system to crash as a result. &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== TCP SYN Flood Attack ===&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transmission_Control_Protocol Transmission Control Protocol] connection request packets can be used to attack a target machine by causing the target to create half-open connections and reserve all of the ports on the machine. This is done by attempting to create a regular connection with the target, but never returning anything back to them after they have sent the SYN-ACK packet. Since the process of opening a TCP connect is a three-way handshake this will stall the process while waiting for confirmation from the attacker. Unlike an ICMP flood this attack does not depend on having more bandwidth than the target because there is a relatively small number of ports that have to be reserved.&amp;lt;sup&amp;gt;[1,2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
DoS attacks are not limited to only a server scale. Individual applications on a users machine are also prone to attack depending on the software. [http://en.wikipedia.org/wiki/IRC IRC] is a very common example of where the various types of attacks used on servers can be seen on a smaller scale. These can include exploits such as buffer overflow which can cause software to get confused and fill disk space or consume all available memory or CPU time. As well as the more common types of attack such as flooding.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
As certain websites on the Internet grew more popular a relatively interesting phenomena started to develop in which websites were unintentionally being attacked by huge spikes in popularity. It is almost always the case that when big and often very popular sites link to small, unknown websites these sites cannot handle all of the extra traffic and end up under a denial of service like effect. [http://www.digg.com Digg], [http://www.slashdot.org Slashdot] and [http://www.fark.com Fark] are prime examples of websites that's only goal is to increase the popularity of other websites and they have gained a reputation for their own related &amp;quot;effects&amp;quot; when any website is posted on them.&lt;br /&gt;
&lt;br /&gt;
Unintentional attacks are not limited to popularity. Routes such as D-Link and Netgear also have a history of flooding [http://en.wikipedia.org/wiki/Network_Time_Protocol Network Time Protocol] servers without the intention of the owner of the router.&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
=== Application Level ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Tools for conducting denial-of-service attacks]]&lt;br /&gt;
* [[Internet Control Message Protocol]]&lt;br /&gt;
* [[ping]]&lt;br /&gt;
* [[Smurfing]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks. Retrieved April 11, 2009, from http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# CERT/CC Denial of Service. Retrieved April 11, 2009, from http://www.cert.org/tech_tips/denial_of_service.html&lt;br /&gt;
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, from http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# &amp;quot;Simple Nomad&amp;quot;, Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, from http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&amp;amp;id=1439320&lt;br /&gt;
# Plonka, Dave. (August 21, 2003). Flawed Routers Flood University of Wisconsin Internet Time Server. Retrieved April 12, 2009, from http://pages.cs.wisc.edu/~plonka/netgear-sntp/&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T18:08:13Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
Goals of the attacks:&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;flood&amp;quot; a network which will prevent legitimate network traffic&lt;br /&gt;
* disrupt connections between two machines, which will prevent access to a service&lt;br /&gt;
* disrupt the service given to a particular system or person &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
There are two basic ways that the [[Internet Control Message Protocol]] is used to deny service. The first is by flooding the target with [[ping]] messages until they are overwhelmed by trying to send responses and are slowed down. This can be done in either a very simple way that's only requirement is that you have more bandwidth than the target you are attacking or in a more complex way such as [[Smurfing]] or the Smurf Attack which exploits poorly configured network devices allow packets to be sent to all other hosts on a network using the broadcast address. The other way is called a often called a nuke and the most popular example is called the [http://en.wikipedia.org/wiki/Ping_of_death Ping of Death] which sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to target. Because of the size of the packet the target  cannot reassemble them. This often causes the system to crash as a result. &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== TCP SYN Flood Attack ===&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transmission_Control_Protocol Transmission Control Protocol] connection request packets can be used to attack a target machine by causing the target to create half-open connections and reserve all of the ports on the machine. This is done by attempting to create a regular connection with the target, but never returning anything back to them after they have sent the SYN-ACK packet. Since the process of opening a TCP connect is a three-way handshake this will stall the process while waiting for confirmation from the attacker. Unlike an ICMP flood this attack does not depend on having more bandwidth than the target because there is a relatively small number of ports that have to be reserved.&amp;lt;sup&amp;gt;[1,2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
DoS attacks are not limited to only a server scale. Individual applications on a users machine are also prone to attack depending on the software. [http://en.wikipedia.org/wiki/IRC IRC] is a very common example of where the various types of attacks used on servers can be seen on a smaller scale. These can include exploits such as buffer overflow which can cause software to get confused and fill disk space or consume all available memory or CPU time. As well as the more common types of attack such as flooding.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
As certain websites on the Internet grew more popular a relatively interesting phenomena started to develop in which websites were unintentionally being attacked by huge spikes in popularity. It is almost always the case that when big and often very popular sites link to small, unknown websites these sites cannot handle all of the extra traffic and end up under a denial of service like effect. [http://www.digg.com Digg], [http://www.slashdot.org Slashdot] and [http://www.fark.com Fark] are prime examples of websites that's only goal is to increase the popularity of other websites and they have gained a reputation for their own related &amp;quot;effects&amp;quot; when any website is posted on them.&lt;br /&gt;
&lt;br /&gt;
Unintentional attacks are not limited to popularity. Routes such as D-Link and Netgear also have a history of flooding [http://en.wikipedia.org/wiki/Network_Time_Protocol Network Time Protocol] servers without the intention of the owner of the router.&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
=== Application Level ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [[Tools for conducting denial-of-service attacks]]&lt;br /&gt;
* [[Internet Control Message Protocol]]&lt;br /&gt;
* [[ping]]&lt;br /&gt;
* [[Smurfing]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks. Retrieved April 11, 2009, from http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# CERT/CC Denial of Service. Retrieved April 11, 2009, from http://www.cert.org/tech_tips/denial_of_service.html&lt;br /&gt;
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, from http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# &amp;quot;Simple Nomad&amp;quot;, Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, from http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&amp;amp;id=1439320&lt;br /&gt;
# Plonka, Dave. (August 21, 2003). Flawed Routers Flood University of Wisconsin Internet Time Server. Retrieved April 12, 2009, from http://pages.cs.wisc.edu/~plonka/netgear-sntp/&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Denial-of-service_attack Denial-of-service Attacks]&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T18:02:33Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
Goals of the attacks:&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;flood&amp;quot; a network which will prevent legitimate network traffic&lt;br /&gt;
* disrupt connections between two machines, which will prevent access to a service&lt;br /&gt;
* disrupt the service given to a particular system or person &amp;lt;sup&amp;gt;[2]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
There are two basic ways that the [[Internet Control Message Protocol]] is used to deny service. The first is by flooding the target with [[ping]] messages until they are overwhelmed by trying to send responses and are slowed down. This can be done in either a very simple way that's only requirement is that you have more bandwidth than the target you are attacking or in a more complex way such as [[Smurfing]] or the Smurf Attack which exploits poorly configured network devices allow packets to be sent to all other hosts on a network using the broadcast address. The other way is called a often called a nuke and the most popular example is called the [http://en.wikipedia.org/wiki/Ping_of_death Ping of Death] which sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to target. Because of the size of the packet the target  cannot reassemble them. This often causes the system to crash as a result. &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== TCP SYN Flood Attack ===&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Transmission_Control_Protocol Transmission Control Protocol] connection request packets can be used to attack a target machine by causing the target to create half-open connections and reserve all of the ports on the machine. This is done by attempting to create a regular connection with the target, but never returning anything back to them after they have sent the SYN-ACK packet. Since the process of opening a TCP connect is a three-way handshake this will stall the process while waiting for confirmation from the attacker. Unlike an ICMP flood this attack does not depend on having more bandwidth than the target because there is a relatively small number of ports that have to be reserved.&amp;lt;sup&amp;gt;[1,2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
DoS attacks are not limited to only a server scale. Individual applications on a users machine are also prone to attack depending on the software. [http://en.wikipedia.org/wiki/IRC IRC] is a very common example of where the various types of attacks used on servers can be seen on a smaller scale. These can include exploits such as buffer overflow which can cause software to get confused and fill disk space or consume all available memory or CPU time. As well as the more common types of attack such as flooding.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
As certain websites on the Internet grew more popular a relatively interesting phenomena started to develop in which websites were unintentionally being attacked by huge spikes in popularity. It is almost always the case that when big and often very popular sites link to small, unknown websites these sites cannot handle all of the extra traffic and end up under a denial of service like effect. [http://www.digg.com Digg], [http://www.slashdot.org Slashdot] and [http://www.fark.com Fark] are prime examples of websites that's only goal is to increase the popularity of other websites and they have gained a reputation for their own related &amp;quot;effects&amp;quot; when any website is posted on them.&lt;br /&gt;
&lt;br /&gt;
Unintentional attacks are not limited to popularity. Routes such as D-Link and Netgear also have a history of flooding [http://en.wikipedia.org/wiki/Network_Time_Protocol Network Time Protocol] servers without the intention of the owner of the router.&amp;lt;sup&amp;gt;[6]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
=== Application Level ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks. Retrieved April 11, 2009, from http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# CERT/CC Denial of Service. Retrieved April 11, 2009, from http://www.cert.org/tech_tips/denial_of_service.html&lt;br /&gt;
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, from http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# &amp;quot;Simple Nomad&amp;quot;, Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, from http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&amp;amp;id=1439320&lt;br /&gt;
# Plonka, Dave. (August 21, 2003). Flawed Routers Flood University of Wisconsin Internet Time Server. Retrieved April 12, 2009, from http://pages.cs.wisc.edu/~plonka/netgear-sntp/&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T17:49:34Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
Goals of the attacks:&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;flood&amp;quot; a network which will prevent legitimate network traffic&lt;br /&gt;
- disrupt connections between two machines, which will prevent access to a service&lt;br /&gt;
- disrupt the service given to a perticular system or person [2]&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
There are two basic ways that [[ICMP]] is used to deny service. The first is by flooding the target with [[ping]] messages until they are overwhelmed by trying to send responses and are slowed down. This can be done in either a very simple way that's only requirement is that you have more bandwidth than the target you are attacking or in a more complex way such as the [[Smurf Attack]] which exploits poorly configured network devices allow packets to be sent to all other hosts on a network using the broadcast address. The other way is called a often called a nuke and the most popular example is called the [[Ping of Death]] which sends an ICMP ECHO request packet that is much larger than the maximum IP packet size to target. Because of the size of the packet the target  cannot reassemble them. This often causes the system to crash as a result. &amp;lt;sup&amp;gt;[1]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== TCP SYN Flood Attack ===&lt;br /&gt;
&lt;br /&gt;
[[TCP]] connect request packets can be used to attack a target machine by causing the target to create half-open connections and reserve all of the ports on the machine. This is done by attempting to create a regular connection with the target, but never returning anything back to them after they have sent the SYN-ACK packet. Since the process of opening a TCP connect is a three-way handshake this will stall the process while waiting for confirmation from the attacker. Unlike a ICMP flood this attack does not depend on having more bandwidth than the target because there is a relatively small number of ports that have to be reserved.&amp;lt;sup&amp;gt;[1,2]&amp;lt;/sup&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
DoS attacks are not limited to only a server scale. Individual applications on a users machine are also prone to attack depending on the software. [[IRC]] is a very common example of where the various types of attacks used on servers can be seen on a smaller scale. These can include exploits such as buffer overflow which can cause software to get confused and fill disk space or consume all available memory or CPU time. Aswell as the more common types of attack such as flooding.&amp;lt;sup&amp;gt;[3]&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
As certain websites on the Internet grew more popular a relatively interesting phenomena started to develope in which websites were unintentionally being attacked by huge spikes in popularity. It is almost always the case that when big and often very popular sites link to small, unknown websites these sites cannnot handle all of the extra traffic and end up under a denial of service like effect. Digg, Slashdot and Fark are prime examples of websites that's only goal is to increase the popularity of other websites and they have gained a repuation for their own related &amp;quot;effects&amp;quot; when any website is posted on them.&lt;br /&gt;
&lt;br /&gt;
Unintentional attacks are not limited to popularity. Routes such as D-Link and Netgear also have a history of flooding [[Network Time Protocol]] servers without the intention of the owner of the router.[6]&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
=== Application Level ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks. Retrieved April 11, 2009, from http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# CERT/CC Denial of Service. Retrieved April 11, 2009, from http://www.cert.org/tech_tips/denial_of_service.html&lt;br /&gt;
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, from http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# &amp;quot;Simple Nomad&amp;quot;, Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, from http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&amp;amp;id=1439320&lt;br /&gt;
# Plonka, Dave. (August 21, 2003). Flawed Routers Flood University of Wisconsin Internet Time Server. Retrieved April 12, 2009, from http://pages.cs.wisc.edu/~plonka/netgear-sntp/&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T17:46:01Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
=== Application Level ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks. Retrieved April 11, 2009, from http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# CERT/CC Denial of Service. Retrieved April 11, 2009, from http://www.cert.org/tech_tips/denial_of_service.html&lt;br /&gt;
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, from http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# &amp;quot;Simple Nomad&amp;quot;, Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, from http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&amp;amp;id=1439320&lt;br /&gt;
# Plonka, Dave. (August 21, 2003). Flawed Routers Flood University of Wisconsin Internet Time Server. Retrieved April 12, 2009, from http://pages.cs.wisc.edu/~plonka/netgear-sntp/&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T16:39:40Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
=== Application Level ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks. Retrieved April 11, 2009, http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# CERT/CC Denial of Service. Retrieved April 11, 2009, http://www.cert.org/tech_tips/denial_of_service.html&lt;br /&gt;
# Mullen, Ruth. Flood Protection and Ignoring People. Retrieved April 11, 2009, http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# &amp;quot;Simple Nomad&amp;quot;, Strategies for Defeating Distributed Attacks. Retrieved April 11, 2009, http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
# Parks, J. (2008, August 25). DDoS Attack Prevention - The Best Medicine. Retrieved April 12, 2009, from http://ezinearticles.com/?DDoS-Attack-Prevention---The-Best-Medicine&amp;amp;id=1439320&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T16:25:25Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
=== Application Level ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks, http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# CERT/CC Denial of Service, http://www.cert.org/tech_tips/denial_of_service.html&lt;br /&gt;
# Mullen, R, Flood Protection and Ignoring People, http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# Strategies for Defeating Distributed Attacks, http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T16:12:06Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&amp;lt;ref&amp;gt;{{Cite web|url=http://anml.iu.edu/ddos/types.html|title=Types of DDoS Attacks|accessdate=April 11 2009}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&amp;lt;ref&amp;gt;{{Cite web|url=http://www.irchelp.org/irchelp/mirc/flood.html|title=Flood Protection and Ignoring People|accessdate=April 11 2009}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&amp;lt;ref&amp;gt;{{Cite web|url=http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html|title=Strategies for Defeating Distributed Attacks|accessdate=April 11 2009}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
=== Application Level ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Types of DDoS Attacks, http://anml.iu.edu/ddos/types.html&lt;br /&gt;
# Flood Protection and Ignoring People, http://www.irchelp.org/irchelp/mirc/flood.html&lt;br /&gt;
# Strategies for Defeating Distributed Attacks, http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T01:12:36Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&amp;lt;ref&amp;gt;{{Cite web|url=http://anml.iu.edu/ddos/types.html|title=Types of DDoS Attacks|accessdate=April 11 2009}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&amp;lt;ref&amp;gt;{{Cite web|url=http://www.irchelp.org/irchelp/mirc/flood.html|title=Flood Protection and Ignoring People|accessdate=April 11 2009}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&amp;lt;ref&amp;gt;{{Cite web|url=http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html|title=Strategies for Defeating Distributed Attacks|accessdate=April 11 2009}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
=== Application Level ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-12T01:08:00Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A '''denial of service attack (DoS attack)''' is generally the attempt to degrade the resources of another computer, or crash it, so the that the intended users of that computer can not longer use it. The methods used to do such an attack usually involve an attempt to exploit a weakness in one of the protocols that are used on the internet to cause harm to the target machine or make it lose and use resources at an unusual level. Since denial of service attacks are so common today protection has become a very important concern for machines on the internet.&lt;br /&gt;
&lt;br /&gt;
== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&amp;lt;ref&amp;gt;{{Cite web|url=http://anml.iu.edu/ddos/types.html|title=Types of DDoS Attacks|accessdate=April 11 2009}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&amp;lt;ref&amp;gt;{{Cite web|url=http://www.irchelp.org/irchelp/mirc/flood.html|title=Flood Protection and Ignoring People|accessdate=April 11 2009}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&amp;lt;ref&amp;gt;http://www.windowsecurity.com/whitepapers/Strategies_for_Defeating_Distributed_Attacks.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
=== Application Level ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-05T18:36:59Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;/* Application front end hardware */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
=== Application Level ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-05T18:35:50Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Attack Methods ==&lt;br /&gt;
&lt;br /&gt;
=== ICMP flood ===&lt;br /&gt;
&lt;br /&gt;
=== Application level floods ===&lt;br /&gt;
&lt;br /&gt;
=== Distributed attack ===&lt;br /&gt;
&lt;br /&gt;
=== Unintentional attack ===&lt;br /&gt;
&lt;br /&gt;
== Prevention and Protection ==&lt;br /&gt;
&lt;br /&gt;
=== Firewalls ===&lt;br /&gt;
&lt;br /&gt;
=== Switches and Routers ===&lt;br /&gt;
&lt;br /&gt;
=== Application front end hardware ===&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
&lt;br /&gt;
== External links ==&lt;br /&gt;
&lt;br /&gt;
--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks</id>
		<title>Denial Of Service Attacks</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Denial_Of_Service_Attacks"/>
				<updated>2009-04-03T21:32:54Z</updated>
		
		<summary type="html">&lt;p&gt;Frostd:&amp;#32;New page: --~~~~&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;--[[User:Frostd|Frostd]] 17:32, 3 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Frostd</name></author>	</entry>

	</feed>