{"version":"1.0","provider_name":"MozDomains Blog","provider_url":"https:\/\/www.mozdomains.co.mz\/blog\/en","author_name":"Momed Jussub","author_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/","title":"Top 10 DDoS Protection Companies - MozDomains Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"bosrh7scyD\"><a href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/\">Top 10 DDoS Protection Companies<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/top-10-ddos-protection-companies\/embed\/#?secret=bosrh7scyD\" width=\"600\" height=\"338\" title=\"&#8220;Top 10 DDoS Protection Companies&#8221; &#8212; MozDomains Blog\" data-secret=\"bosrh7scyD\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/ddos.jpg","thumbnail_width":800,"thumbnail_height":450,"description":"Distributed Denial of Service (DDoS) is a type of attack that involves using multiple compromised networks to target a single website. Hackers execute\u00a0DDoS attacks by hijacking unprotected computers and installing malware. By using thousands of these &#8220;bots&#8221; or &#8220;zombie computers,&#8221; hackers target a single web-based application or website, flooding it with a huge volume of traffic and causing the target to become unavailable to legitimate users. Recently,\u00a0DDoS protection\u00a0has become increasingly difficult as\u00a0DDoS attacks have now become sophisticated.\u00a0DDoS attackershave moved their focus from the network and transport layers to the application layer, where\u00a0DDoS protection\u00a0is difficult to maintain. Exponential growth is seen\u2026"}