Easier?! I don't know what half the terms mean, much less how to do'em, so
I'd best stick with low-tech, grass-roots myself. What anyone else on the
list chooses to do (or not) at any hour of the day or night is his/her
business. But a guy who comes along and endeavors to set up a Trojan horse
of a list devoted exclusively to e-chat with or about himself within the
community space of another list is getting too tactical for my taste, so I
was just responding in kind and pointing out the numerical differential
between the Host list and the Parasite one, which is our only advantage
against the sort of invasion I've seen Kent make on another list.
And, as I pointed out in my first "unsubscribe" post, what would be "easier"
is Kent's taking himself and his Hessian friend out of the firing line he's
lit here--and thereby out of range.
Candice
on 6/10/01 11:37 PM, Chris Jones at [log in to unmask] wrote:
> Candice,
>
> This tactic could be called cyber-terrorism. . . also a DoS attack (denial of
> service attack to translate the weird computer talk of techno geeks).
> Unfortunately, assuming the numbers are sufficient, you would probably crash
> the hotmail server along with kent. . .
>
> However, the easier way to undertake such an attack is not to have all the
> people sit on their computers and do it at the same time but to collect all
> participants emails into a file, at your leisure, write a shell script with
> cron on a hacked university network, which can also make multiple multiple
> copies, and let it fly. The programmed shell script will do it all for you.
> (You could also hack some DNS servers using an old version of bind to
> increase the numbers... plenty of them around, BTW.)
>
> perhaps others have more experience in hacking and I can stand corrected.
>
> Chris Jones
|