However, then the application on the smartphones started working again. This is a hacker attack on a computer system with the intention of making its resources inaccessible to users. One of the most common methods of attack is the saturation of the attacked computer or network equipment with a large number of external queries. Most often they are meaningless or incorrectly formulated. Thus, the attacked equipment cannot respond to users, or responds so slowly that it becomes actually inaccessible.
All rights reserved IN-Ukraine.info - 2022