fashionista
Tastes like chicken
does any know how to explain to me what a ping attack ont eh computer is and how to counteract it?
maybe she should have, but maybe she should have punched you in the face as wellOriginally posted by psycho_mushy
u should have posted this in the "IT Stuff" forum to get post counts!
Originally posted by psycho_mushy
u should have posted this in the "IT Stuff" forum to get post counts!
Originally posted by Huy
This belongs in IT Stuff
lol!! "Word for Word".Originally posted by Huy
The basic principles of flooding are that you should have better network bandwidth than the person you're trying to flood, and that what you do to flood them (e.g. generate ping requests) should be *less* resource-expensive for your machine to produce than for the victim's machine to deal with. There is also the corrolary that you should avoid being caught.
Good idea * me whips up a running service in the background to leech off ppl* ...Originally posted by Huy
It would be funny if there were P2P apps running in the background and fashionista is uploading to others, without any knowledge of it even happening.
How about no?Originally posted by fatmuscle
how about I send u the entire Cisco CCNA Semester 1 course?
then you'll know a lot more than just PING
Originally posted by asdf
How about no?
Seriously, just pisses me off when people just "copy 'n' paste" with out any reference. A simple link or quote from the site is sufficient.