Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Xerxes

Name: Anonymous 2010-12-30 16:32

What exactly does it exploit?
I just can't seem to be able to pin it down.
It seems to work through TOR (videos), therefore it must be really bandwidth light.
Seems to me it first sends a couple of specific packets that take down the target, and then every t sends a "keep-down" packet.

An amazing piece of software, props to whoever it's creator is.

Name: Anonymous 2010-12-30 17:44

I'm watching 300 now for some reason. What a coincidence.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List