Matches in DBpedia 2014 for { <http://dbpedia.org/resource/WinNuke> ?p ?o. }
Showing items 1 to 34 of
34
with 100 items per page.
- WinNuke abstract "The term WinNuke refers to a remote denial-of-service attack (DoS) that affected the Microsoft Windows 95, Microsoft Windows NT and Microsoft Windows 3.1x computer operating systems. The exploit sent a string of OOB (out of band) data to the target computer on TCP port 139 (NetBIOS), causing it to lock up and display a Blue Screen of Death. This did not damage or change the data on the computer's hard disk, but any unsaved data would be lost.The so-called OOB simply means that the malicious TCP packet contained an Urgent Pointer (URG). The Urgent Pointer is a rarely used field in the TCP header, used to indicate that some of the data in the TCP stream should be processed quickly by the recipient. Affected operating systems didn't handle the Urgent Pointer field correctly.A person under the screen-name "_eci" published his C source code for the exploit on June 7, 1997. With the source code being widely used and distributed, Microsoft was forced to create security patches, which were released a few weeks later. For a time, numerous flavors of this exploit appeared going by such names as fedup, gimp, killme, killwin, knewkem, liquidnuke, mnuke, netnuke, muerte, nuke, nukeattack, nuker102, pnewq, project1, pstlince, simportnuke, sprite, sprite32, vconnect, vzmnuker, wingenocide, winnukeit, winnuker02, winnukev95, wnuke3269, wnuke4, and wnuke95.A company called SemiSoft Solutions from New Zealand created a small program, called AntiNuke, that blocks WinNuke without having to install the official patch.Years later, a second incarnation of WinNuke that uses another, similar exploit was found.".
- WinNuke wikiPageExternalLink winnuke.
- WinNuke wikiPageID "312630".
- WinNuke wikiPageRevisionID "598396605".
- WinNuke hasPhotoCollection WinNuke.
- WinNuke subject Category:Denial-of-service_attacks.
- WinNuke type Abstraction100002137.
- WinNuke type Act100030358.
- WinNuke type Activity100407535.
- WinNuke type Attack100972621.
- WinNuke type Denial-of-serviceAttacks.
- WinNuke type Event100029378.
- WinNuke type Operation100955060.
- WinNuke type PsychologicalFeature100023100.
- WinNuke type YagoPermanentlyLocatedEntity.
- WinNuke comment "The term WinNuke refers to a remote denial-of-service attack (DoS) that affected the Microsoft Windows 95, Microsoft Windows NT and Microsoft Windows 3.1x computer operating systems. The exploit sent a string of OOB (out of band) data to the target computer on TCP port 139 (NetBIOS), causing it to lock up and display a Blue Screen of Death.".
- WinNuke label "WinNuke".
- WinNuke label "WinNuke".
- WinNuke label "WinNuke".
- WinNuke label "WinNuke".
- WinNuke label "WinNuke".
- WinNuke label "WinNuke".
- WinNuke sameAs WinNuke.
- WinNuke sameAs WinNuke.
- WinNuke sameAs WinNuke.
- WinNuke sameAs WinNuke.
- WinNuke sameAs WinNuke.
- WinNuke sameAs m.01td1t.
- WinNuke sameAs Mx4rvhPMfZwpEbGdrcN5Y29ycA.
- WinNuke sameAs Q2140041.
- WinNuke sameAs Q2140041.
- WinNuke sameAs WinNuke.
- WinNuke wasDerivedFrom WinNuke?oldid=598396605.
- WinNuke isPrimaryTopicOf WinNuke.