DOS attacks: Going to the source

If not the source of the attacks, at least perhaps the source of the tools used to make them. Take a look at this article which is a Q&A session with a programmer who claims to be the author of two of the big Denial of Service programs available on the net. Though it hasn't been confirmed, it's a good possibility that his programs (TFN, TFN2K) were used in last week's attacks.

It's an interesting, if short, article that covers why the guy wrote the programs in the first place, as well as speculation on how difficult it is to track down the person who used them (or others like them). Worth the read.

Tip: You can use the A/Z keys to walk threads.
View options

No comments in this discussion yet.