Against sites with incredibly fat network pipes, of course, that won't work. The recent Distributed Denial of Service (DDoS) attacks against Yahoo! and other major networks in the spring of 2000 were mounted by programs like the Tribal Flood Network (TFN), an easy-to-use tool that takes over corporate and home computers and uses them to each launch teardrop attacks against a victim site.
You can close up holes that make the teardrop possible. The teardrop takes advantage of a router's multicast address, a special IP address on the router's subnet that, in many default configurations, will forward packets to every machine on the subnet. By forging PING requests from the victim's site and sending them to a multicast address, a malicious hacker will cause the victim to be flooded with PING responses from each machine on the subnet. Therefore, corporate routers should never honor requests sent from the Internet (or anywhere else, really) to the multicast address. Using your router's configuration program, you can turn off forwarding from your multicast address.
This won't completely solve the problem, but it will help. For more discussion of the teardrop and how to fix it, see http://grc.com/r&d/NoMoreDoS2.htm, which includes a list of the networks that are the top offenders.
Barrie Sosinsky (firstname.lastname@example.org) is president of consulting company Sosinsky and Associates (Medfield MA). He has written extensively on a variety of computer topics. His company specializes in custom software (database and Web related), training and technical documentation.