Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » TERM » B »

Booter services

A service offered by cyber criminals that provides paying customers with distributed denial of service (DDoS) attack capabilities on demand. According to this article on eWeek, Booter services, or Booters, are "Web-based services that do DDoS for hire at very low prices and are very hard to take down."

Booters typically present potential customers with a Web front end that enables the end user to specify a Web site that they want the Booter service to target. Detecting and tracing Booters is complicated by the fact that the Internet service provider (ISP) that the Booter service appears to be hosted from is frequently not where the Booter is really located.

Booter services are frequently used by script kiddies and are responsible for many of the recent DDoS attacks that have received mainstream attention in the news.







TECH RESOURCES FROM OUR PARTNERS
LATEST ARTICLES
SEO Dictionary

From keyword analysis to backlinks and Google search engine algorithm updates, our search engine optimization glossary lists 85 SEO terms you need... Read More »

Slideshow: History of Microsoft Operating Systems

Microsoft Windows is a family of operating systems for personal computers. In this article we look at the history of Microsoft operating... Read More »

Slideshow: Interesting Facts About Google Search

From Goats to Penguins, a server outage and trillions of searches, our slideshow presents interesting facts about Google and the Google.com... Read More »

STUDY GUIDES
Java Basics, Part 1

Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »

Java Basics, Part 2

This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »

The 7 Layers of the OSI Model

The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »