Skip to main content

How to run an infinite ping


How to run an infinite ping0

h4ckfreak | 12:32 PM |

How to run an infinite ping

How to run an infinite ping against your server
The 'ping' command in Windows Server is a tool used in checking to see if a specific domain name or IP address is responsive by attempting to send it four very small packets of data, measuring the amount of time in milliseconds it takes the packet to reach the address. If the data is received, the ping is successful. If it is not, it will time out.
By default, the 'ping' command will only send four packets. However, the 'ping' command can be used to send an infinite number of these small packets to the IP address. It is useful in such cases where a server is being rebooted, and you wish to ensure the server restarts correctly.
To run an infinite ping, first open the MS-DOS Command Prompt, by navigating to 'Start' and clicking 'Run'.

Once the 'Run' window is open, type 'CMD', and press Enter. You will then be at a Command Prompt.

Next, type in the following command, where [IP address] is the address you wish to ping, and press Enter:
ping [IP address] -t

Once entered, the prompt will then endlessly ping the IP address or domain name until the command is stopped by holding down the 'Control' key and pressing 'C'. You can also stop the ping by closing the DOS prompt window.
IMAGE SUBJECTED TO Hackfreak

Comments

Popular posts from this blog

Proxy list

* http://www.proxy4free.com * http://www.publicproxyservers.com * http://www.anonymitychecker.com * http://www.proxz.com * http://www.digitalcybersoft.com/ProxyList/ * http://www.checker.freeproxy.ru * http://tools.rosinstrument.com/proxy/ * http://www.samair.ru/proxy/ * http://www.multiproxy.org/anon_proxy.htm * http://www.atomintersoft.com/product...xy/proxy-list/ [/b]

Useful & Valuable Sites

For Urgent Blood Requirements call +91888704898 Learn online Udemy Coursera Khan Openculture W3Schools Buy online Flipkart Amazon Myntra shopclues freekaamaal Online App Ajio Craftvilla Mirraw Limeroad Voonik Travel Booking Railway Paytm Redbus goibibo Trivago Sales OLX Justdail Quikr carwale 2ndhandbazar Jobs Search Bank Jobs BJS Glassdoor LinkedIn Freelancer S/W Downloads Filehippo Softpedia Download.com SourceForge BrotherSoft Flight Booking Qatar Singapore Makeytrip goindgo Emirates Status Enquiry Passport Panind Aadhar voter PF Yoga Acupoints Acupuncture Prachina Yoga Ayurveda Learn Cloud AWS Azure IBM VMware Redhat Search Engines Google yahoo amazon dogpile aol
Top 10 Most Common Cyber Attacks Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A DDoS attack is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. Unlike attacks that are designed to enable the attacker to gain or increase access, denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s enough to have the satisfaction of service denial. However, if the attacked resource belongs to a business competitor, then the benefit to the attacker may be real enough. Another purpose of a DoS attack can be to take a system offline so that a different kind of attack can be launched. One common example is session hijacking, which I’ll describe later. There are different types of DoS and DDoS attacks; the most common are ...