This is the talk page for discussing improvements to the Smurf attack article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: |
||||||||||||||||||||||||||||||||
|
It would be really nice to have an etymology for this page. It was called a smurf attack because the source file for the original implementation was called smurf.c. But, why did the author choose that name. I believe the term originated in military slang for a style of amplifier. And I believe the military's term originated in the idea of one smurf (Papa smurf) giving an order, and all the other smurfs saying "Yes, Papa smurf!" and carrying it out. But, I do not know this, it is only a guess. Omnifarious 15:17, 12 June 2006 (UTC)
The link to http://www.netscan.org/ do not work. Should it be removed? --Anka.213 13:27, 15 July 2006 (UTC)
First, much appreciated effort went into this page, most appreciated... but... The more techies of various flavors add to or remove references to tcp/ip four, seven and eleven layer models, the more 98% of the public will gasp. Initial idea is how about an analogy of a clown juggling and another clown juggler starts tossing ball after ball to the main act? At some point, the whole crowd-pleaser aspect of the router (this analogy needs simplify-speak, e.g., web-server, internet backbone devices, etc.). Put a very dumbed down version first, the current intro only impresses IT savants, not the public... Raretrees (talk) 16:53, 22 June 2013 (UTC)
I have removed the Template:technical tag from this page. After looking through Wikipedia:Make technical articles accessible, it seems like what this article mostly needed was a sentence or two of non-technical introduction (which I have added). But I may be too close to the subject matter to know what is accessible and what isn't. If people still think there is a problem here, please be specific about which parts of the article are unclear to people who don't live and breathe TCP/IP, and also what information such people would hope to understand about a smurf attack (I'm assuming we don't want a tutorial-level discussion of IP, ICMP, ping, broadcasts, spoofing, and everything else involved, but just a high level description of what a smurf attack can do). Kingdon 18:17, 16 October 2007 (UTC)
Šmoulové jsou malá stvoření která se dostala do New york a teť jsou v New york a Gargamel dostal taťku šmoulu a chce zněj dostat šmoulí esenci a řekl koumákovi ať udělá modrý měsíc a on to udělal a přivedl do New york zbytek šmoulú a pak spívali lalalalala lalalalala a pak gargamela přelstila celá vesnice ažili až do smrti štastní aveselí konec. — Preceding unsigned comment added by 94.112.119.120 (talk) 12:39, 15 January 2012 (UTC)
This form of attack doesn't solely relay on echo (ping) request. It can by any other icmp request (timestamp and address mask) — Preceding unsigned comment added by 92.15.60.2 (talk) 21:55, 19 November 2012 (UTC)
It looks like the link "Hendric, William (23 March 2016). "Fraggle attack". " was added after the text was written. It provides almost no information and seems to be promotional. --Shoeper (talk) 13:45, 7 August 2021 (UTC)