Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Xerxes

Name: Anonymous 2010-12-30 16:32

What exactly does it exploit?
I just can't seem to be able to pin it down.
It seems to work through TOR (videos), therefore it must be really bandwidth light.
Seems to me it first sends a couple of specific packets that take down the target, and then every t sends a "keep-down" packet.

An amazing piece of software, props to whoever it's creator is.

Name: Anonymous 2013-04-07 1:27

>>5
There's no such thing as a coincidence, it's bullshit made up by kikes to fool the goyim so they can go on to commit more crimes. Anyone who believes in them is shabbos, anyone who knows the truth is a truly wise non-kike.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List