All corrections
Wikipedia April 24, 2026 at 11:26 AM

en.wikipedia.org/wiki/Denial-of-service_attack

2 corrections found

1
Claim
Dyn which is the ISP for sites such as Twitter, Netflix, etc.
Correction

Dyn was not an ISP for Twitter or Netflix. Dyn was a DNS provider/managed DNS service, and the 2016 attack targeted its DNS infrastructure.

Full reasoning

This misidentifies Dyn. During the October 2016 Mirai incident, Dyn was widely described as a DNS provider or managed DNS provider, not an Internet service provider for sites like Twitter and Netflix.

That distinction matters: the attack disrupted Dyn's DNS services, which made many major websites difficult to reach because domain names were not resolving properly. It was not because Dyn was those sites' ISP.

2 sources
2
Claim
the Apache HTTP Server will, by default, accept requests up to 2GB in size
Correction

This default-size claim is incorrect. Current Apache documentation says the default request-body limit is 1 GiB, and older versions used 0 (unlimited) — not 2 GB.

Full reasoning

Apache's own documentation does not show a default request-body limit of 2 GB.

  • The Apache HTTP Server documentation for LimitRequestBody lists the default as 1073741824 bytes (1 GiB).
  • The same documentation notes that in Apache HTTP Server 2.4.53 and earlier, the default was 0 (unlimited).
  • Red Hat's guidance on the Apache change likewise says the default was changed from 0 (unlimited) to 1 GiB.

So “2GB by default” is not the documented default for current Apache, and it was not the documented older default either.

2 sources
Model: OPENAI_GPT_5 Prompt: v1.16.0