Just how do DDos attack

With this simple tutorial I’ll describe how to use LOIC, this program that  usually uses Private to establish known DDoS episodes.
To begin with, let’s know very well what a DDos strike is:
DDoS means Distributed Denial of Service Distributed Denial of Service Strike.

But what do these kind of attacks contain? Very easy: any computer has a handling capacity limit, so when it surpasses that limit may cause overloads.

And the machines, although very powerful, remain computers.
In what it is made up then, is by using the drive of the place to overload one or a couple of servers so the destination website is inoperative. anonymous book
The legality of the type of disorders has been questioned, nevertheless, you that they don’t do any destruction, nor can grab information with them.

How can it work?

The first rung on the ladder is to disable the antivirus because this program is diagnosed as a disease.
We downloaded this program here …
https://github.com/NewEraCracker/LOIC
or
https://sourceforge.net/tasks/loic/
Once downloaded, we unzip it and run it.
From here there are 2 ways to strike:

Automatic:

Important data for operating DDoS problems are: IRC Server: here moves the server url Interface: this is actually the dock, generally it is 6667.
Route: by default it is #loic, but sometimes it changes.
The organizers of the DDoS problems supply them. In this manner, it is all programmed. They control the disorders from their Computer and immediate them to where they need.After the data is put, we indicate IRC Setting (HiveMind).This program will only hook up and begin DDoS attacks.

Manual:

First you must get into the URL the website that people want to harm (in Web address, within Selected Aim for). For instance, yourwebsite.com, or any website! (clearly, do not get it done).
Therefore we should add www.yourwebsite.com
Once the Web address is entered, select Lock on, and in Selected Focus on an IP can look (lots segregated by dots). Then press IMMA CHARGIN MAH LAZER. This program will only hook up and start releasing DDoS attacks.