Page 2 of 2 FirstFirst 12
Results 11 to 13 of 13
  1. #11
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Third planet from the Sun
    Quote Originally Posted by nihil
    Neither suggestion is in the least bit practical. These guys are a commercial organisation and the only people with the resources to DoS them are those with bot armies, who are themselves criminals. It isn't going to happen.

    Again, give what these guys are up to and host, don't you think that their resources are going to be totally locked down?


    Your statement about bot armies is not entirely true. I have a Huge 100,000 + bot army; and I am not a criminal - a more precise label would be idiot! Let me splain. With one simple command I can launch a major attack on any system anywhere on the planet.

    Unfortunately I forgot the command.

  2. #12
    Senior Member JPnyc's Avatar
    Join Date
    Jan 2005
    HAHAHAHAHAHAHAHAA! Ok, that got me.

  3. #13
    Join Date
    Jan 2008
    That reminds me of the "Hold the ALT and F4 keys to launch a denial of service attack" signature I had. Maybe that was the command.

Similar Threads

  1. Starting a Computer Business?
    By |3lack|ce in forum Other Tutorials Forum
    Replies: 19
    Last Post: June 8th, 2005, 03:44 PM
  2. A guide to proactive network security
    By SDK in forum Miscellaneous Security Discussions
    Replies: 0
    Last Post: November 30th, 2004, 11:45 PM
  3. Tcp/ip
    By gore in forum Newbie Security Questions
    Replies: 11
    Last Post: December 29th, 2003, 07:01 AM
  4. Network Scanning Policy - Template
    By thehorse13 in forum Network Security Discussions
    Replies: 5
    Last Post: June 1st, 2003, 02:03 AM
  5. mini-tutorial on network topologies
    By cwk9 in forum Other Tutorials Forum
    Replies: 6
    Last Post: June 3rd, 2002, 06:57 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts

We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.