Te Kete Ipurangi Navigation:

Te Kete Ipurangi

Te Kete Ipurangi user options:

Ministry of Education.
Kaua e rangiruatia te hāpai o te hoe; e kore to tātou waka e ū ki uta

Huge hack “ugly sign of future” for internet threats

24 March 2014

Hacker with a balaclava inside a computer screen

Hackers used weaknesses in the Network Time Protocol (NTP) to flood servers with huge amounts of data. The NTP is a system used to synchronise computer clocks. A computer needing to synchronise time with the NTP will send a small amount of data to make the request. The NTP will then reply by sending data back. The hackers manipulated this system to flood their targets with data. 

Read more

Discussion starters

  • Characteristics of technological outcomes: Use this and other examples to explain how technological outcomes have been successfully used by end-users for purposes other than what they were originally designed for. (level 4)
  • Characteristics of technology: Use this and other examples to evaluate past technological outcomes in the light of experiences subsequent to their development and/or contemporary understandings. (level 6)


Image courtesy of chanpipat/FreeDigitalPhotos.net

Keywords: hack, internet, characteristics of technological outcomes, characteristics of technology

Return to top ^