ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Twitter Hacked - Denial of Service Attack - What does that Mean?

Updated on August 6, 2009

Recently the wildly popular web site Twitter was hacked. The site went offline for a short period, causing minor panics throughout the population of the free world with too much free time.

What happened? Did evil ninja scientists sneak into Twitter headquarters and bog down the server by playing numerous games of Solitaire or Exteel or Evony? Nope. The unpleasant truth is that your computer or the computer of someone you know may have played a part in this international event.

What is Denial Of Service?

A Denial of Service, or DOS, (also called a distributed denial of service, or ddos) attack is a relatively common occurrence on the Internet. Most denial of service attacks go unnoticed by Internet patrons. Modern web servers and web server software are designed to detect and circumvent DOS intrusions without major disruptions in service. Ddos protection is the standard, not the exception. Rarely do DOS attacks even make the news any more.

Twittering birds did not cause the Twitter Denial of Service Attack.
Twittering birds did not cause the Twitter Denial of Service Attack.

Visualize a DOS attack this way; you are strolling down the street in your hometown. Periodically you recognize a friend from high school who greets you and asks "What are you doing, Bob?" (for the sake of this discussion, play along and act like your name is Bob ... Roberta is also acceptable). You are happy to see your old friend and you pleasantly respond with a few words to bring them up to date on your recent activities. Your friend moves on, satisfied with your summary. Now imagine that every person from your graduating class and every person you've ever met since then simultaneously taps you on the shoulder and wants to know what you're up to. You have thousands, or even millions, of people all waiting for a personalized response from you. Along with a very sore shoulder from all that tapping, you quickly realize that you will never be able to even begin to recognize and respond to all huge crowd forming around you. Panic sets in. You rush back into Wal Mart, where no one knows your name. If you are offended by Wal Mart, just imagine yourself curled into a ball on the sidewalk. Same difference.

A DOS condition is somewhat like that, except you are a Twitter web server and your friends are browsers all over the Internet. The Wal Mart is still a Wal Mart. The Twitter server becomes so overwhelmed by requests that it simply shuts down, refusing to respond to anyone. A well designed server, actually an array of servers referred to as a "server farm", can politely deal with DOS intrusions through highly technical means such as ignoring them or asking other computers on the Internet to stop relaying their requests. The Twitter servers just need a little upgrading; the Twitter craze exploded so quickly that they probably outgrew their hardware.

How Does This Happen?

How could such a thing happen? Imagine a disgruntled Twitter user sitting at his computer clicking incessantly, creating Tweets with the sole intent of overloading the Twitter server.Now imagine hundreds or even hundreds of thousands of coordinated computers generating Tweets at the same time. That's a Denial of Service Attack. Twitter didn't break, it just overheated and needed a time out. It's very unlikely that any data was lost, save for the attempted tweets that may have been ignored when the DOS was in force.

Anyway, how in the world did the Forces of Evil manage to coordinate so many computers all over the world. Well, that's probably your fault. One of the primary purposes of computer viruses these days is to control infected systems and use them for nefarious purposes. Should you get a virus that merely insists on serving you pop-up ads, consider yourself fortunate. A really devious virus take over your machine and allows someone on the other side of the world to control what it does. Your computer, or a computer in your neighborhood may have participated in the Twitter DOS attack.

There are viruses floating around that take over computers and sell your computer time to the highest bidder. A typical computer is idle about 95 per cent of the time anyway. You can't press keys and click the mouse fast enough to make a modern computer work very hard. The Central Processing Unit, or CPU, spends the vast amount of its' time doing nothing. When you do need it to do something, that something happens very quickly, then the CPU goes back to waiting. Hackers who write viruses take advantage of the horsepower of modern CPUs to install subtle programs that leverage idle CPUs to perform nasty tasks like coordinated DOS attacks. A 'good' or well-written virus will stay our of your way; you'll never know it's there. Of course, make sure your anti-virus programs are current if the FBI knocks on your door.

I think Twitter...

See results

Some images may be courtesy of


    0 of 8192 characters used
    Post Comment

    • nicomp profile imageAUTHOR

      nicomp really 

      8 years ago from Ohio, USA

      @emohealer Thanks!

    • emohealer profile image

      Sioux Ramos 

      8 years ago from South Carolina

      Hey, I really learned something today. You rock, I now know the terms and get it. Much needed information actually, thank you so much for not only knowing, but also knowing how to help others (me) know!


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)