The way DDoS works, after researching, is by people who are mostly downloading torrents. They're rooted into mostly the cd-key generators. Once launched, pretty much the DDoS host can use your own computer to attack an IP address. There is software on the internet to scan your system for these registered malicious software on your system. If you want to be more information on how DDoS works, there's always Google. So I'd advise anyone who is downloading torrents, to find software that scans such malicious programs.