The text discusses NTP-based DDoS attacks, which have become popular recently and caused trouble for some gaming web sites and service providers. These attacks work by exploiting the Network Time Protocol (NTP), a simple UDP-based protocol that can be persuaded to return a large reply to a small request. The amplification factor of NTP is 206x, making it ideal as a DDoS tool. To mitigate these attacks, web site owners should make configuration changes to firewalls and NTP servers. Additionally, implementing BCP-38 would eliminate source IP spoofed attacks of all kinds (DNS, NTP, SNMP, ...).