DOS attacks: Going to the source

— 1:13 AM on February 15, 2000

If not the source of the attacks, at least perhaps the source of the tools used to make them. Take a look at this article which is a Q&A session with a programmer who claims to be the author of two of the big Denial of Service programs available on the net. Though it hasn't been confirmed, it's a good possibility that his programs (TFN, TFN2K) were used in last week's attacks.

It's an interesting, if short, article that covers why the guy wrote the programs in the first place, as well as speculation on how difficult it is to track down the person who used them (or others like them). Worth the read.

Like what we're doing? Pay what you want to support TR and get nifty extra features.
Top contributors
1. BIF - $340 2. Ryu Connor - $250 3. mbutrovich - $250
4. YetAnotherGeek2 - $200 5. End User - $150 6. Captain Ned - $100
7. Anonymous Gerbil - $100 8. Bill Door - $100 9. ericfulmer - $100
10. dkanter - $100
Tip: You can use the A/Z keys to walk threads.
View options

No comments in this discussion yet.