Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Xerxes

Name: Anonymous 2010-12-30 16:32

What exactly does it exploit?
I just can't seem to be able to pin it down.
It seems to work through TOR (videos), therefore it must be really bandwidth light.
Seems to me it first sends a couple of specific packets that take down the target, and then every t sends a "keep-down" packet.

An amazing piece of software, props to whoever it's creator is.

Name: Anonymous 2010-12-30 18:56

>An amazing piece of software, props to whoever it's creator is.
Toy for babies. Children destroy, real men build.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List