What exactly does it exploit?
I just can't seem to be able to pin it down.
It seems to work through TOR (videos), therefore it must be really bandwidth light.
Seems to me it first sends a couple of specific packets that take down the target, and then every t sends a "keep-down" packet.
An amazing piece of software, props to whoever it's creator is.
>>8
That's the best Christmas present I've ever gotten!! Thank you so much!
Name:
James Gosling2013-04-06 16:12
GAWWWWWWWWZMACSSSSSS FLABBERGASTS MY AUDIENCE
Name:
Anonymous2013-04-06 16:21
>>6 real men build things that cannot be destroyed by children.
Name:
Anonymous2013-04-07 1:27
>>5
There's no such thing as a coincidence, it's bullshit made up by kikes to fool the goyim so they can go on to commit more crimes. Anyone who believes in them is shabbos, anyone who knows the truth is a truly wise non-kike.
Name:
Anonymous2013-04-07 1:56
>>12
It's no coincidence that you are russian and a subhuman piece of shit.