SpywareGuide powered by Actiance Security Labs
Search SpywareGuide Database & Site
Home Access the Guide
List of Products List of Companies List of Categories
Tools
X-RayPC
Terms and Definitions
 

Fork Bomb

Type: Attack

The fork bomb is a form of denial of service attack against a computer system that uses the fork function. It relies on the assumption that the number of programs and processes which may be simultaneously executed on a computer has a limit.

A fork bomb works by creating a large number of processes very quickly in order to saturate the available space in the list of processes kept by the computer's operating system. If the process table becomes saturated, no new programs may be started until another terminates. Even if that happens, it is not likely that a useful program may be started since the instances of the bomb program are each waiting to take that slot themselves.

Not only do fork bombs use space in the process table, they each use processor time and memory. As a result of this, the system and existing programs running on it become much more difficult (slow), or even impossible, to use.

Fork bombs can be considered as a special type of wabbit (a program that self-replicates without using hosts or network functionality).

Browse other terms

Recent Modifications
Notice: Undefined variable: incprefix in /data/www/spywareguide/term_show.php on line 144
2023-3-28  Adult Networks/Services
2023-3-7  New York Islanders Fans
2017-2-10  Adult Hosts
2016-3-30  CoolWebSearch
2015-9-29  Malicious URLS
2015-5-19  Dialers
2015-1-5  Email Threats
2013-7-20  Date Manager
2013-4-10  BeeBus
2012-12-18  JT.Moonwalk
 
Company  | Site and Spyware FAQ
© Copyright 2003- Notice: Use of undefined constant Y - assumed 'Y' in /data/www/spywareguide/term_show.php on line 176 2025, Actiance, Inc. All rights reserved.   Privacy Policy