if one would need to manipulate petitiononline.com through greater means than curl with proxies. I am talking about a few thousand signatures. What would be the general idea to do it?
>>2
Yeah, being an asshole is not easy and you don't need to know anything, Thanks.
Name:
Anonymous2008-07-01 17:37
Three words: Honeynet reverse-sploit botsen
Name:
Anonymous2008-07-01 17:39
>>2
I was just interested in the general idea. Maybe creating a program that creates packets and manipulates the send IP adress and adds the needed data into the packet body?
No idea.
>>11 Checking for WEP vulnerabilities… none found.
But…but…WEP vulnerabilities have been found, and they're universal. What kind of broken autoconfig is this?
>>22
Yes. same person. *YOU* are the same person with these fags.
You're just trying to act like you aren't. YOU FAIL. FAILED. AGAIN. FAIL. GET IT? FAIL. FUCKING FAIL.
>>24
I DONT GIVE A SHIT.
IM THE LAST OF THE MOHICANS.
I TRULY FUCKING BELIEVE YOU'RE ALL FUCKING FAGGOT FUCKS WHO CANT PROGRAM FOR SHIT. FUCKING LAMERS.
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy
All work and no play makes Jack a dull boy