ALERT

[LAST CHANCE] Data Layer: Modern Business, Defined

Nuker

Definition - What does Nuker mean?

A nuker is a type of hacker whose purpose is to send corrupt data to a computer and ultimately bring it to a complete halt. A modified ping utility is used over and over during the computer nuking process, during which invalid Internet Control Message Protocol packets are sent. Nukers can corrupt computers through instant messaging programs, where infected messages can be sent repeatedly through macros or AppleScript. Most modern systems are protected against this type of attack, but Nukers can still take down a website by taking advantage of weak ports and using a denial of service (DoS) attack to shut down systems.

Techopedia explains Nuker

One of the first and most damaging computer nuke attacks was called WinNuke. This affected Microsoft 95, Microsoft Windows NT and Windows 3.1x systems. The nuker responsible for this damaging occurrence connected out-of-band data to a targeted computer, thus locking it and causing it to display the "blue screen of death', which resulted in a computer crash. Microsoft developed a patch to prevent this harmful type of DoS attack for any similar types of attacks on Microsoft systems. In the WinNuke attack, ports 135 to 139 and port 445 were affected.

The United States enacted the National Information Infrastructure Protection Act of 1996, which increased prison time for convicted nukers. Other countries have adopted similar laws. Consumers who are concerned about DoS attacks should contact their Internet service provider for assistance in combating these types of attacks.

Techopedia Deals

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
"Techopedia" on Twitter


'@Techopedia'
Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Resources
The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.