While Linux users have retracted accusations that SCO made up its claims it was a victim of a distributed denial-of-service attacks, doubts about those claims linger.. . .
While Linux users have retracted accusations that SCO made up its claims it was a victim of a distributed denial-of-service attacks, doubts about those claims linger.

In the face of third-party evidence that the attacks did happen, Linux users retracted accusations that SCO wasn't telling the truth. But Linux and security experts stood by their statements that SCO's description of the attacks make no sense, and that competent network administrators could easily protect themselves against the type of attack SCO says occurred.

In a statement issued Wednesday, the company said it was experiencing a distributed denial-of-service (DDoS) attack that caused its "Web site (https://landing.sco.com/ and corporate operational traffic to be unavailable during the morning hours, including e-mail, the company's intranet, and customer-support operations."

SCO said on Friday that the attacks had ended.

The company claims it was targeted by a type of attack known as a SYN attack, in which external servers begin to initiate a connection with a target server, and then refuse to release that connection.

The link for this article located at SecurityPipeline.com is no longer available.