{"id":174,"date":"2019-03-11T23:44:58","date_gmt":"2019-03-11T21:44:58","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=174"},"modified":"2020-05-31T01:44:48","modified_gmt":"2020-05-30T23:44:48","slug":"ddos-in-a-nutshell","status":"publish","type":"post","link":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/","title":{"rendered":"DDoS In A Nutshell"},"content":{"rendered":"<p style=\"text-align: justify;\">Distributed Denial of Service (DDoS) is a major threat to your website. Here\u2019s why\u2026<\/p>\n<p style=\"text-align: justify;\">DDoS attacks\u00a0target websites and businesses of every size, including individual live streamers.<\/p>\n<p style=\"text-align: justify;\">With more than 50 million attacks every year, they\u2019re on the rise and growing in frequency, strength, and hacktivism.<\/p>\n<p style=\"text-align: justify;\">That\u2019s almost two attacks for every second of each day in a year!<\/p>\n<p style=\"text-align: justify;\">The attacks have increased by 125 percent year-on-year with a 35% jump in attack duration, lasting between 6-24 hours.<\/p>\n<p style=\"text-align: justify;\">With the emergence of the IoT,\u00a0DDoS attacks\u00a0have seen even higher traffic rates.<\/p>\n<p style=\"text-align: justify;\">They account for a staggering one-third of all website downtime and can be purchased for as low as $150 on the black market.<\/p>\n<p style=\"text-align: justify;\">In a nutshell,\u00a0DDoS attacks\u00a0have existed for years, but now they\u2019ve evolved to be more devastating and easier to launch than ever before.<\/p>\n<p style=\"text-align: justify;\">As cybercriminals develop more destructive techniques, everyone who uses the internet should learn about\u00a0DDoS attacks\u00a0and how to protect against them.<\/p>\n<h2 style=\"text-align: justify;\"><strong>How Do\u00a0DDoS Attacks\u00a0Occur?<\/strong><\/h2>\n<p style=\"text-align: justify;\">DDoS attacks\u00a0disrupt normal operations by destroying performance and availability. How?<\/p>\n<p style=\"text-align: justify;\">At its most basic level, a DDoS attack overwhelms your website with so much traffic that your website become slow, unresponsive, and ultimately crashes.<\/p>\n<p style=\"text-align: justify;\">To orchestrate this symphony of traffic, a hacker uses a remotely controlled device that has already been infected, otherwise known as a bot, short for robot.<\/p>\n<p style=\"text-align: justify;\">A collection of these infected devices is a called a botnet.<\/p>\n<p style=\"text-align: justify;\">Basically, an army of\u00a0remote control\u00a0zombies ready to disable or destroy any system in its path.<\/p>\n<p style=\"text-align: justify;\">Unfortunately, the bad news doesn\u2019t end there because not all\u00a0DDoS attacks\u00a0come from botnets.<\/p>\n<h2 style=\"text-align: justify;\"><strong>Types Of\u00a0DDoS Attacks\u00a0<\/strong><\/h2>\n<p style=\"text-align: justify;\">DDoS attacks\u00a0can fall into three broad categories, depending on the attack.<\/p>\n<p style=\"text-align: justify;\">1. Volumetric Attacks (also known as Network-Centric Attacks)<br \/>\na. The most common types of\u00a0DDoS attacks<br \/>\nb. Use botnets to consume bandwidth<br \/>\nc. Examples include NTP Amplification, DNS Amplification, UDP Flood, TCP Flood<\/p>\n<p style=\"text-align: justify;\">2. State-Exhaustion Attacks (also known as Protocol Attacks)<br \/>\na. Exploits a weakness in the Layer 3 and Layer 4 protocol stack<br \/>\nb. Targets the connection state in firewalls, web application servers, load balancers<br \/>\nc. Examples include Syn Flood, Ping of Death<\/p>\n<p>3. Application-Layer Attacks<br \/>\na. The most sophisticated of attacks and most challenging to identify\/mitigate<br \/>\nb. Operated by a single machine, it\u2019s very stealthy and able to fly \u201cunder the radar\u201d<br \/>\nc. Examples include HTTP Flood, Attack on DNS Services, HTTPS, and SMTP<\/p>\n<p style=\"text-align: justify;\">\n<h2 style=\"text-align: justify;\"><strong>DDoS Protection<\/strong><\/h2>\n<p style=\"text-align: justify;\">Here are some security measures for successful\u00a0DDoS protection:<\/p>\n<p style=\"text-align: justify;\"><strong>1. Extra Bandwidth:<\/strong>\u00a0An effective way to enhance\u00a0DDoS protection\u00a0is by increasing the bandwidth available for your web server. This allows your website to handle sudden and unexpected surges in traffic. However, this is more of a buffer than a complete solution providing critical time to act before your resources are overwhelmed.<\/p>\n<p style=\"text-align: justify;\"><strong>2. Defend Network Perimeter<\/strong>: You can also enhance your network&#8217;s defense perimeter by taking additional security measures such as<\/p>\n<p style=\"text-align: justify;\">i) rate limiting your router to prevent web server overwhelming<br \/>\nii) dropping spoofed or malformed packages<br \/>\niii) set lower SYN, ICMP, and UDP flood up thresholds<\/p>\n<p style=\"text-align: justify;\">However, this is very technical and will require some level of incident handling knowledge to effectively respond to\u00a0DDoS attacks.<\/p>\n<p style=\"text-align: justify;\"><strong>3. DDoS Specialist:<\/strong>\u00a0Another option is to hire a DDoS specialist who can save you from the attack during the time of crisis. However, this will require deep pockets as it is very costly.<\/p>\n<p style=\"text-align: justify;\"><strong>4. cWatch Web:\u00a0<\/strong>Since the above options may not be in your budget or scope of knowledge, cWatch Web arms you with\u00a0DDoS protection\u00a0as a turnkey defense system. This\u00a0web security solution\u00a0comes equipped with the cure, the prevention, and live 24\/7\/365 assistance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Distributed Denial of Service (DDoS) is a major threat to your website. Here\u2019s why\u2026 DDoS attacks\u00a0target websites and businesses of every size, including individual live streamers. With more than 50 million attacks every year, they\u2019re on the rise and growing in frequency, strength, and hacktivism. That\u2019s almost two attacks for every second of each day in a year! The attacks have increased by 125 percent year-on-year with a 35% jump in attack duration, lasting between 6-24 hours. With the emergence of the IoT,\u00a0DDoS attacks\u00a0have seen even higher traffic rates. They account for a staggering one-third of all website downtime and\u2026<\/p>\n","protected":false},"author":3,"featured_media":175,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-174","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":5}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DDoS In A Nutshell - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS In A Nutshell - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"Distributed Denial of Service (DDoS) is a major threat to your website. Here\u2019s why\u2026 DDoS attacks\u00a0target websites and businesses of every size, including individual live streamers. With more than 50 million attacks every year, they\u2019re on the rise and growing in frequency, strength, and hacktivism. That\u2019s almost two attacks for every second of each day in a year! The attacks have increased by 125 percent year-on-year with a 35% jump in attack duration, lasting between 6-24 hours. With the emergence of the IoT,\u00a0DDoS attacks\u00a0have seen even higher traffic rates. They account for a staggering one-third of all website downtime and\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-11T21:44:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:44:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/dsm-ddos-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"DDoS In A Nutshell\",\"datePublished\":\"2019-03-11T21:44:58+00:00\",\"dateModified\":\"2020-05-30T23:44:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/\"},\"wordCount\":607,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/dsm-ddos-1.jpeg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/\",\"name\":\"DDoS In A Nutshell - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/dsm-ddos-1.jpeg\",\"datePublished\":\"2019-03-11T21:44:58+00:00\",\"dateModified\":\"2020-05-30T23:44:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/dsm-ddos-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/dsm-ddos-1.jpeg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/ddos-in-a-nutshell\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS In A Nutshell\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.co.mz\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS In A Nutshell - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/","og_locale":"en_US","og_type":"article","og_title":"DDoS In A Nutshell - MozDomains Blog","og_description":"Distributed Denial of Service (DDoS) is a major threat to your website. Here\u2019s why\u2026 DDoS attacks\u00a0target websites and businesses of every size, including individual live streamers. With more than 50 million attacks every year, they\u2019re on the rise and growing in frequency, strength, and hacktivism. That\u2019s almost two attacks for every second of each day in a year! The attacks have increased by 125 percent year-on-year with a 35% jump in attack duration, lasting between 6-24 hours. With the emergence of the IoT,\u00a0DDoS attacks\u00a0have seen even higher traffic rates. They account for a staggering one-third of all website downtime and\u2026","og_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/","og_site_name":"MozDomains Blog","article_published_time":"2019-03-11T21:44:58+00:00","article_modified_time":"2020-05-30T23:44:48+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/dsm-ddos-1.jpeg","type":"image\/jpeg"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"DDoS In A Nutshell","datePublished":"2019-03-11T21:44:58+00:00","dateModified":"2020-05-30T23:44:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/"},"wordCount":607,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/dsm-ddos-1.jpeg","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/","name":"DDoS In A Nutshell - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/dsm-ddos-1.jpeg","datePublished":"2019-03-11T21:44:58+00:00","dateModified":"2020-05-30T23:44:48+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/#primaryimage","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/dsm-ddos-1.jpeg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/dsm-ddos-1.jpeg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/ddos-in-a-nutshell\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.co.mz\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"DDoS In A Nutshell"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.co.mz\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.co.mz","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/comments?post=174"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/174\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media\/175"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media?parent=174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/categories?post=174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/tags?post=174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}