shapu wrote:
Sure.
Every computer has its own individual address, called an IP address. Every server has its own, as well.
There are 13 big honkin' servers around the world that do all of the sorting of IP addresses and turn them into domain names. So, the IP address 256.128.1.1 (not a real IP number, by the way) gets turned into Thisisawebsite.com by those 13 servers. You ask to go to thisisawebsite.com, your computer contacts the big server, which says, "Ah, ha! That's 256.128.1.1!!" and tells your computer that number, and your computer goes to that website.
Many companies also have their own internal domain name servers that do the same thing, basically, except on the office level - maybe you want to contact a coworker's network drive.
Theoretically, there are an infinite number of potential IP addresses, because each IP address can actually refer you again to another more internal IP address, and so on and so forth.
Anyway, a nasty bad person could hi-jack a few computers and tell them, "Ask website1.com to contact internetaddress2.com to get some information." In theory, website1.com's own domain server would stop the bad person at this point, because it only has a trusted list of sites that are allowed to contact it.
But if bad person could trick website 1.com into thinking that the original request actually came from internetaddress2.com, and it trusts that particular set of servers, then it would happily send all sorts of information, or perhaps just a bunch of pings. Tricking the computer into thinking data came from someplace it didn't is called "spoofing."
If enough computers are involved in the initial request, then website1.com (and maybe website2.com, and website3.net, and any other websites the bad person wants to involve in this) would flood internetaddress2.com with all sorts of requests for information, and internetaddress2.com shuts down from overload.
And all this because most computers like website1.com aren't configured to do "Reverse path authentication," which basically is just figuring out whether data actually came from where it says it did.
And thus, the end of the internet, because it would just shut itself down from overload.
Also known as a massive denial of service attack. Usually they're done with groups of people logging on at once or even a tiny line of code, but this involves entire networks.
Personally I'm not too worried. Sure, I'll be bummed out for awhile, but I'll be able to live.

Yes, I'm still alive...still alive...