This is the type of behavior I was talking about when I coined the term cyber-terrorism. Releasing such code for the use of others in public forum, will harm the fabric of the network, is an overt act of terrorism in its final result. I hope when they the FBI catch up with you, they pipe sunlight and air to you. jamie rishaw wrote:
Excuse me susan. Dont read any further.
Jason:
Why must you - and other people - be so fucking stupid?
Why not release a technical explanation of a problem, or something in a package, network stack, operating system or (*) - in a logical, "Hey, here's a problem, I think we should figure out how to fix it" or "Hey, here's a problem, and here's how I think it can be fixed" manner?
Are you twelve?
Do you think youre gonna get sucked off more now (or perhaps, more accurately, sucked off period) now that the #chix-with-big-tits IRC channel knows that you released something that's gonna be a pain in engineers' asses all over the world?
You've gained no respect here.
On Tue, Jan 30, 2001 at 09:42:23PM -0500, Jason Legate wrote:
This is thrown together partially from the original sources of stream, and partially from my own ramblings, it was a quick and dirty hack, so there are parts of it that are messy. For testing purposes on a lan, if you want to verify packet headers, and not send as fast as it can, you can define SLOW.
This version has the fixed tcp cksum, and a MSS window of compile-time definable size.
-- i am jamie at arpa dot com .. and this is my .sig.
core1.dns.microsoft.com# sho access-list 101 Extended IP access list 101 deny udp any any eq domain (874572345872345 matches)
-- Thank you; |--------------------------------| | Thinking is a learned process. | | ICANN member @large | | Gigabit over IP, ieee 802.17 | | working group | | Resilient Packet Transport | |--------------------------------| Henry R. Linneweh