Cognitive Technology Team
Cognitive Technology Team
Aug 24, 2025 · Information Security

How DoS Attacks Work and How to Defend Against Them

This article explains what denial‑of‑service (DoS) attacks are, describes their underlying principles and common variants such as SYN, UDP, ICMP, and HTTP floods, and outlines comprehensive defense strategies including firewalls, IDS, CDN, multi‑active architectures, SYN cookies, rate limiting, and cloud‑based protection services.

DDoSDOSDefense Strategies
0 likes · 9 min read
How DoS Attacks Work and How to Defend Against Them
Liangxu Linux
Liangxu Linux
Mar 25, 2024 · Information Security

How to Use Gzip Compression to Overload Web Crawlers (Gzip Bomb Tutorial)

This guide shows how to create a tiny gzip‑compressed file, serve it with FastAPI, and exploit automatic decompression in Python's requests library to force a crawler to consume massive memory, effectively turning compression into a denial‑of‑service weapon.

Denial of ServiceFastAPIcompression
0 likes · 7 min read
How to Use Gzip Compression to Overload Web Crawlers (Gzip Bomb Tutorial)
Liangxu Linux
Liangxu Linux
May 20, 2023 · Information Security

What Is a Linux Fork Bomb and How to Stop It

This article explains what a Linux fork bomb is, shows the classic one‑liner shell code that creates it, breaks down each component of the command, and provides practical steps such as limiting user processes via ulimit and editing limits.conf to prevent system crashes.

Denial of ServiceLinuxProcess Limits
0 likes · 4 min read
What Is a Linux Fork Bomb and How to Stop It
MaGe Linux Operations
MaGe Linux Operations
May 10, 2022 · Information Security

How Evil Regex Can Cripple Your Server: Understanding ReDoS Attacks

This article explains how maliciously crafted regular expressions can cause catastrophic backtracking, leading to Regular Expression Denial of Service (ReDoS) attacks, illustrates the problem with code examples, and provides practical mitigation strategies for developers.

Denial of ServiceReDoSregex
0 likes · 9 min read
How Evil Regex Can Cripple Your Server: Understanding ReDoS Attacks
Liangxu Linux
Liangxu Linux
Oct 27, 2021 · Information Security

How an Integer Overflow in IIS’s Read Function Triggers CVE‑2015‑1635

The article explains how a signed‑to‑unsigned integer overflow in IIS’s Read function bypasses size checks, leading to a zero‑length read that triggers the CVE‑2015‑1635 vulnerability in HTTP.sys, allowing attackers to crash the server with crafted Range requests.

CVE-2015-1635Denial of ServiceHTTP.sys
0 likes · 6 min read
How an Integer Overflow in IIS’s Read Function Triggers CVE‑2015‑1635
ITPUB
ITPUB
May 31, 2017 · Information Security

How a 13‑Character Fork Bomb Crashes Linux and How to Prevent It

This article explains the tiny 13‑character Linux fork bomb that can exhaust system resources and cause a denial‑of‑service crash, demonstrates its effect on a cloud VM, and shows how to mitigate the threat using ulimit and limits.conf settings.

Denial of Servicefork bombshell security
0 likes · 6 min read
How a 13‑Character Fork Bomb Crashes Linux and How to Prevent It