The Jungle is self-supported by showing advertisements via Google Adsense.
Please consider disabling your advertisement-blocking plugin on the Jungle to help support the site and let us grow!
We also show significantly less advertisements to registered users, so create your account to benefit from this!
Please consider disabling your advertisement-blocking plugin on the Jungle to help support the site and let us grow!
We also show significantly less advertisements to registered users, so create your account to benefit from this!
Questions or concerns about this ad? Take a screenshot and comment in the thread. We do value your feedback.
76 million views and counting watched the Elon/Trump interview.
|
(08-13-2024, 07:54 AM)Jaguarmeister Wrote: If there was a ddos attack, those viewer/listener numbers could be inflated by that, no? I find it difficult to believe 76 million Americans tuned in. Perhaps there were others around the world interested enough to tune in to get it to that number or a chunk of it was the ddos attack. I tuned in for a bit, but couldn't get in for a while. That said, he already has my vote so it wasn't needed to sway me. After thinking about it for a while, the answer is no, the DDOS attack could not inflate the "views" numbers, only the numbers of people/computers connected to the server. In order to count as a "view" a legitimate login has to occur or a legitimate connection to the specific page hosting the interview. Without getting too terribly technical, I'll try to explain in simple terms how a DDOS attack might work. A basic knowledge of how TCP works is helpful. All one needs to do is have a group of computers do what is called a SYN scan over and over. When your computer connects to a web server, the first thing it sends is a "packet" with the SYN flag set. The server will respond with a SYN-ACK flag set signalling that it's ready to establish communication. It also sets aside a "slot" for your communications. If your computer doesn't respond the server will sit there and wait meanwhile taking up that "slot". It will wait a certain amount of time before it finally closes the connection by sending a RST packet. Meanwhile your computer does the same sequence again taking up more "slots". This happens on an open port on the server (typically port 80). Depending on how the firewall on the server is set up, the same procedure can take place on all ports. Ports that are "blocked" or "filtered" by a firewall will respond with a SYN-RST flag and close the connection, however the the open port is still waiting for the next step to establish communication (which never happens). Doing the SYN-RST transmission also takes time (milliseconds) away from the server. Now imagine a group of computers doing the same thing over-and-over several times a second. Pretty soon the server runs out of "slots" to open up for communication which will slow it down and make it inaccessible for legitimate connections. In that scenario none of the computers have actually established communication on the particular page that is hosting the interview. They simply flooded the server causing it to "run out of slots" and possibly slowed it down. There are 10 kinds of people in this world. Those who understand binary and those who don't. |
Users browsing this thread: |
1 Guest(s) |
The Jungle is self-supported by showing advertisements via Google Adsense.
Please consider disabling your advertisement-blocking plugin on the Jungle to help support the site and let us grow!
We also show less advertisements to registered users, so create your account to benefit from this!
Please consider disabling your advertisement-blocking plugin on the Jungle to help support the site and let us grow!
We also show less advertisements to registered users, so create your account to benefit from this!
Questions or concerns about this ad? Take a screenshot and comment in the thread. We do value your feedback.