mda... daca mai tzinetzi voi minte prezentasem doua optziuni nu tocmai ortodoxe si o a treia care a fost aprobata de toata lumea I. hack tha flooding host 'n eject lamah d-acolo II. flood tha lamah's real host (cafe/homeDial/company) - requires root access to one or more hacked hosts with some bandwith to spare and modified sources of slice3 so it attacks NOT with 614k but with 2M III. mail [EMAIL PROTECTED] with cc [EMAIL PROTECTED],[EMAIL PROTECTED],[EMAIL PROTECTED],root @provider.of.hacked.host
io personal am recurs la metoda a treia.. numa' ca se pare ca adminu ala e prea tampit (sau decedat) de nu se uita.. si la o saptamana dupa ce-am trimis mailul imi da aku un amic un forward la o diskutzie pe andarnet cu ceva de genu: <Schweppes> bha mi_o trimis mail in root <Schweppes> cica bla bla flood una alta <Schweppes> nah sa vezi ce_l frig P.S. la nervi+cercetari ulterioare s-a dovedit ca p-acolo mailurile nu se citesc chiar daca sunt de genul Please check your host for intruders becouse someone has used it for irc (check your ports 65534 and 31339 i think) bouncing and flooding peace-??? Jaymzu --- Send e-mail to '[EMAIL PROTECTED]' with 'unsubscribe rlug' to unsubscribe from this list.
