Skip to comments.
Hack attack! Taking down criminal media sites
Just one example of many
| Mid-to-late March '03
| Various Psuedonyms
Posted on 03/31/2003 12:05:37 AM PST by John Robinson
click here to read article
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-70 last
To: sadimgnik
Al Jazeera is a foreign site spewing anti-American propaganda. It is a legitimate target.
Where as I would have no idea of how to attack such a site, I applaud those that choose to serve their country and take the fight to the enemy through such means.
It wouldn't break my heart if Indymedia and their ilk were targets as well, but I do respect their right to free espression - up until they break the law. They are bordering on conspiracy to commit a crime by giving detailed info. about how to do DDOS attacks to any leftist script kiddie with a grudge. I'm sure the FBI will be knocking on their door shortly.
61
posted on
03/31/2003 10:34:43 AM PST
by
anymouse
To: John Robinson
John, you might want to consider disallowing hotmail/yahoo mail accounts for new registrants.
62
posted on
03/31/2003 10:38:59 AM PST
by
Poohbah
(Crush your enemies, see them driven before you, and hear the lamentations of their women!)
To: drlevy88; Poohbah; John Robinson
My thoughts exactly.
Besides, it's not like they're gonna do any more about this.
Interesting trivia I heard from someone MORE computer-savvy than I. Wholesale hacking went on between American and ChiCom hackers (we're talking defacement, DDOS, and stuff like that) during the crisis over that EP-3E incident (where that ChiCom pilot was NOT watching where he was going), and to date there have been ZERO indictments or prosecutions.
Come to think of it, those cases may have been placed below "fixing that nasty left hook on the SAC's swing at the 6th hole at Army-Navy," "finding lost puppies," and "getting cats out of trees."
63
posted on
03/31/2003 10:57:25 AM PST
by
hchutch
("But tonight we get EVEN!" - Ice-T)
To: John Robinson
Hey, as long as they have Alexa on, it can only help us
64
posted on
03/31/2003 10:58:05 AM PST
by
smith288
(Visit my gallery http://www.ejsmithweb.com/fr/hollywood/hollywood.php)
To: Poohbah
Hey, MINE is yahoo!
65
posted on
03/31/2003 11:02:30 AM PST
by
smith288
(Visit my gallery http://www.ejsmithweb.com/fr/hollywood/hollywood.php)
To: smith288
Note that I said "new registrants." You'd be grandfathered.
66
posted on
03/31/2003 11:03:05 AM PST
by
Poohbah
(Crush your enemies, see them driven before you, and hear the lamentations of their women!)
To: Poohbah
Shwew! I have about 7 accounts though...i probably COULD switch it. haha
67
posted on
03/31/2003 11:06:25 AM PST
by
smith288
(Visit my gallery http://www.ejsmithweb.com/fr/hollywood/hollywood.php)
To: John Robinson
bttt for all to review
68
posted on
03/31/2003 11:09:54 AM PST
by
bmwcyle
(Semper Gumby - Always Flexable)
To: hchutch
If it's truly contrary to US law, I don't advocate any such thing. I wish I knew what the US code on this actually said. Whether it expressly forbids the usage of any US network as a part of an effort to hack or to try to hack a computer anywhere in the world. I could see why Congress would want to ban this, so the US can make a case to the world that we won't tolerate malicious cyber-acts perpetrated from our country. Now whether people located in, say, Liberia can hack Iraq to their heart's content, that's completely out of US control. I'd expect the CIA to get nervous about any significant amount of internet traffic going to Iraq from the USA, even if it turned out to be only hacking traffic. A clever Iraqi agent in the USA could surely disguise a communication as, say, a "patriotic DOS attack."
69
posted on
03/31/2003 2:27:57 PM PST
by
drlevy88
To: John Robinson
If you're not planning on searching Free Republic for the next hour or so, reload our search page about a dozen times in quick succession This could, I guess, end up temporarily blocking everybody behind a corporate firewall. Perhaps the protect-bot could attempt to send a notificatory email via SNMP to abuse@[ip-address] when it triggers, and if it succeeds then time out in 5 minutes rather than an hour.
70
posted on
03/31/2003 2:43:21 PM PST
by
drlevy88
Navigation: use the links below to view more comments.
first previous 1-20, 21-40, 41-60, 61-70 last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson