Michaelmichaelhabra.hashnode.dev·Apr 12, 2024Denial of Service Dos & Distributed Denial of Service DDosAn attacker can generate sufficient traffic to starve your server of resources, they can make deny service to legitimate users. Denial-of-service attacks are designed to make a site unavailable to regular users. In a DoS attack, a single computer or...Discussdos attack
Divij Sharmadvjsharma.hashnode.dev·Jan 30, 2024Building a Safer MERN App: Simple Steps for Strong SecurityIn today's digital era, small businesses are increasingly transitioning online, and web-based platforms offer significant advantages. As a result, developers often turn to the MERN stack (MongoDB, Express.js, React, Node.js) for building full-stack w...Discuss·2 likes·38 readsXSS Attacks
Abiodun Awoyemiaagbotemi.hashnode.dev·Jan 11, 2023Solidity Attack Vectors #6 - Denial Of ServiceDenial of Service by rejecting to accept Ether. There are many ways to attack a smart contract to make it unusable. One exploit is a denial of service by making the function to send Ether fail. The solidity fallback function is executed if none of th...Discuss·36 readsdos attack