Author |
Message |
Jigsaw Killer
Not quite a Newb
Joined: 10 Mar 2008
Posts: 34
|
Posted:
Mon Nov 30, 2009 5:21 pm |
|
Would this be considered unethical? Surely it is one of the better ways of knocking a scammer off the net for a couple of days? |
|
|
|
|
devil_woman
Baiting Guru
Joined: 20 Mar 2009
Posts: 3382
Location: Anywhere
|
Posted:
Mon Nov 30, 2009 5:26 pm |
|
What is 'Ping Flooding'? is islike colonic irrigation? |
_________________ [Click here to donate to 419Eater.com]</a>
100+45:goat:
I have trying to access the confirmation code but it always stated Errow Anthony Hills Togo
I am pissing out and off my brain seemed shattered of several thoughts and implications this is really taken much time and am afraid. Sgt Allen Nigeria |
|
|
|
Bolleboos
Elite Baiter
Joined: 07 Sep 2009
Posts: 1000
Location: Paises Bajos
|
Posted:
Mon Nov 30, 2009 5:30 pm |
|
That would be considered hurting ITPs.
Your ISP or hosting provider may slap you for it also.
Please don't. |
_________________ x 13
<-- Ger@ld J0nes aka Remittanceboi, MG security forms, thanks NN!
<-- Emanuel WIMPed from Lagos to Ghana (provided phone help on Bruin's lad)
Miss Ariana Hani: "it seem your balls contains up to 6 eggs that i should destroy with a baseball stick and weep your spinal code so you die"
Mandaline Randy: "i gave you my heart body mind and soul but you did not value it imagine if you were me how would you feel beby its pain ful i was just rooming in the money gram as if am a mad girl while you knows my condition its unfear" |
|
|
|
Scam Patroller
Baiting Guru
Joined: 08 Jul 2004
Posts: 11857
Location: UK
|
Posted:
Mon Nov 30, 2009 5:49 pm |
|
No, we don't do things like that due to the knock on effect to innocent third parties etc, taken from Wikipdeia:
http://en.wikipedia.org/wiki/Ping_flood
Quote: |
A ping flood is a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets. It only succeeds if the attacker has more bandwidth than the victim (for instance an attacker with a DSL line and the victim on a dial-up modem). The attacker hopes that the victim will respond with ICMP Echo Reply packets, thus consuming outgoing bandwidth as well as incoming server bandwidth. If the target system is slow enough, it is possible to consume enough of its CPU cycles for a user to notice a significant slowdown. |
|
_________________
40x 4x 2x 2x 10x 34x 17x 9x 1x 1x 6x 4x 1x 6x 1x 23x
YMCA Summer Holdiay + Bus Hijack
www.scamwarners.com - www.scam-info-links.info - www.aa419.org - The Numpties Gallery |
|
|
|
|