magicoreo.blogg.se

Low orbit ion cannon
Low orbit ion cannon








low orbit ion cannon
  1. #Low orbit ion cannon how to
  2. #Low orbit ion cannon software

#Low orbit ion cannon software

Hivemode allows makes it a DDoS tool, though, or damn close? DigitalHoodoo ( talk) 19:24, 13 December 2010 (UTC) Reply Ĭould someone who knows add a section explaining *why* a piece of DDoS software is named after a space-weapon? I'm sure it's a reference to a particular game or sci-fi universe but other than that it appears as a random choice. LOIC on it's own should not be represented as a DDoS tool.

low orbit ion cannon

Human communication via the internet is what caused LOIC to be used in a distributed fashion. In the case of LOIC, the target is user defined, and the program must be invoked as an administrator in the first place. Implying that LOIC is a DDoS system on its own could be interpreted to mean something similar to a botnet, where multiple computers are compromised in order to execute a DDoS attack, usually via viruses or trojans. LOIC has been used in DDoS attacks, but only because groups of willing participants colluded to attack the same domain at the same time. I think it is worth pointing out that, on its own, LOIC is a DoS program, not a DDoS program. Ipsign ( talk) 05:45, 17 February 2012 (UTC) Reply Possible Problem with the image Cheers ArishiaNishi ( talk) 16:08, 16 February 2012 (UTC) Reply I've found a replacement link, which IMHO looks better thanks for the heads-up. Perhaps another reference source can be found to substantiate the claim. "LOIC was utilized by Project Chanology, a project by the Anonymous group, to attack websites from the Church of Scientology," I read that article, Hackers Hit Scientology With Online Attack By Robert McMillan, and didn't find any assertion that LOIC was the tool used to ddos the Church of Scientology website. What parts of this section could be removed or re-worded? - Demiurge1000 ( talk) 20:02, 23 April 2011 (UTC) Reply too much coverage of this aspect given its significance), but in practice the notable uses are what most secondary sources will cover the tool for. The section is perhaps undue weight to some extent (i.e.

low orbit ion cannon

It was me that added the information about people being arrested for using it, which is certainly not likely to encourage people to use it.

#Low orbit ion cannon how to

I'm not anti-anon or pro-anon or anything however, it reads more like a guide on how to use LOIC than an wiki article explaining what it is. The 'Notable Uses' section has wording that seems less than neutral. This article has been rated as Low-importance on the project's importance scale. This article has been rated as Start-Class on the project's quality scale. Computing Wikipedia:WikiProject Computing Template:WikiProject Computing Computing articles If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks. This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. Find editors who have shown interest in this subject and ask them to take a look here.Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.Identify articles for creation (see also: Article requests).Identify categories related to Computer Security.Review importance and quality of existing articles.Answer question about Same-origin_policy.Oftentimes when it sticks it's because they got some good media coverage and then a lot of people joined in.Article alerts will be generated shortly by AAlertBot. "They throw spaghetti on the wall, and some things stick, some things don't. "A lot of operations have that kind of life to them," she says.

low orbit ion cannon

"One person takes the initiative to put the idea out there, and if there seems to be enough support and enough technical resources, they might go forward. "Someone will say, 'Let's DDoS PayPal for their stopping processing services for WikiLeaks,' " explains New York University professor Gabriella Coleman. The people are the data, and you have to sort through to find those who have legitimate reservations, and separate them from the people who are just trying to cause problems." One day, 100,000 people all in ski masks show up and order nothing. Lyon describes a distributed denial of service, or DDoS, attack this way: "Say you owned a restaurant. "Maybe I would get arrested, but my neighbor was using my Wi-Fi and thought I was running the software, but it's really my neighbor or even someone driving by in their car." "It's really hard to arrest 30,000 people with evidence that is rock solid," he says. There's also a feeling of relative immunity that comes with being online, Lyon says.










Low orbit ion cannon