Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » TERM » B »

Booter services

A service offered by cyber criminals that provides paying customers with distributed denial of service (DDoS) attack capabilities on demand. According to this article on eWeek, Booter services, or Booters, are "Web-based services that do DDoS for hire at very low prices and are very hard to take down."

Booters typically present potential customers with a Web front end that enables the end user to specify a Web site that they want the Booter service to target. Detecting and tracing Booters is complicated by the fact that the Internet service provider (ISP) that the Booter service appears to be hosted from is frequently not where the Booter is really located.

Booter services are frequently used by script kiddies and are responsible for many of the recent DDoS attacks that have received mainstream attention in the news.







TECH RESOURCES FROM OUR PARTNERS
LATEST ARTICLES
Slideshow: 5 Hot Holiday Gifts for Tech Enthusiasts

From cute electronic toys to VR gaming, here are 5 hot gifts to give to your special tech enthusiast this holiday season. Read More »

What's Hot in Tech: AI Tops the List

Like everything in technology, AI touches on so many other trends, like self-driving cars and automation, and Big Data and the Internet of Things... Read More »

DevOp's Role in Application Security

As organizations rush to release new applications, security appears to be getting short shrift. DevSecOps is a new approach that holds promise. Read More »

STUDY GUIDES
Java Basics, Part 1

Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »

Java Basics, Part 2

This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »

The 7 Layers of the OSI Model

The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »