How I became the first person to describe the advent of a new class of computer network attack tools.

20 Years of DDoS: August 5, 1999

Something is happening, but what?

20 years ago today — August 5, 1999 — I rode my mountain bike across the University of Washington campus to work like every other workday. Early mornings in the summer in Seattle can be pretty nice. Sunny, a little cool with dew on the grass.

--

--

--

Information Security Researcher, Consultant, Writer. Support my writing by joining Medium https://git.io/JKLPq (affiliate link — I get a portion of your fee)

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

File Integrity Monitoring (FIM): Using a SaaS Solution for SaaS Environments

We don’t want you to put off your learning until it’s too late.

How a browser Works?

Daily links of Fernand0 — Enlaces diarios de Fernand0 — Issue #490

HTB Retired Box Walkthrough: Beep

Stop with the Obfuscation: Encoding and Encryption are Not the Same

Basics of JWT-Security

HOW TO BUY AND SELL BASIC ATTENTION TOKEN (BAT)

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Dave Dittrich

Dave Dittrich

Information Security Researcher, Consultant, Writer. Support my writing by joining Medium https://git.io/JKLPq (affiliate link — I get a portion of your fee)

More from Medium

Deploying Velocriptor in AWS using CloudFormation — Scaling forensic acquisition

3 Things to Consider before Implementing Data Loss Prevention

Ransomware — Are You Prepared?

Photo by Ewan Kennedy from Pexels

Improving security for remote workers with IAM