Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

Xerxes

Name: Anonymous 2010-12-30 16:32

What exactly does it exploit?
I just can't seem to be able to pin it down.
It seems to work through TOR (videos), therefore it must be really bandwidth light.
Seems to me it first sends a couple of specific packets that take down the target, and then every t sends a "keep-down" packet.

An amazing piece of software, props to whoever it's creator is.

Name: Anonymous 2010-12-31 3:09

Can't seem to find a download link, anyone care to share?

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List