Abstract:Ping is the main TCP/IP order used to examine network connectivity, accessibility and the name analysis, it is mainly used to examine whether the target computer can be connected or not, if the hacker invades, firstly he needs to lock the object and generally uses Ping order to examine the host computer to gain correlative information, then conduct the loophole scanning. How to avoid such attack? The answers is to prevent others ping your personal computer so that the attack cannot continue.