background preloader

Outils

Facebook Twitter

AnonPaste [dot] org. Tetalab - Tetalab. ENOUGH! | If treating people as people means anything at all, it means recognizing their right to self-determination, even when we disagree. Call for Participation - Camp 2011 Public Wiki. From Camp 2011 Public Wiki Lectures, Workshops and Projects Here we call to you not only to participate in but to give a lecture , organize a workshop and work on your project . In return we offer lots of bright people who are eager and knowledgeable to discuss with you. If you can tell us something about new or widely unknown technology we want to know about it. If you are using some kind of technology in a way different from what it was meant for we want to know about it. But we are not only interested in technology and science for its own sake. In general, lectures, workshops, and projects dealing with technology, ethics, science, security, art, philosophy, politics, culture and cooking are welcome.

Villages You can also organize a tent village with your friends and present your favorite projects. Participate In any case don't forget that you can add to the camp in lots of other ways as well. How to With kind regards, The Chaos Communication Camp 2011 - Project Flow Control! Log in. School Factory | What do we mean when we say 'school' in the year 2020? Telecomix. Anonyupload - Free, Legal and and protects your user information. An0nTransl8Tor | #OnePlanet , #OnePeople. LOIC. The software has inspired the creation of an independent JavaScript version called JS LOIC, as well as LOIC-derived web version called Low Orbit Web Cannon. These enable a DoS from a web browser.[4] Use LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP or UDP packets with the intention of disrupting the service of a particular host.

People have used LOIC to join voluntary botnets.[5] Countermeasures LOIC attacks are easily identified in system logs, and the attack can be tracked down to the IP addresses used at the attack.[8] Notable uses Project Chanology and Operation Payback Operation Megaupload Origin of name The LOIC application is named after the Ion cannon, a fictional weapon from many sci-fi works.[14] Other implementations Another implementation of LOIC named LOIC++[15] has been made to run natively on Linux.

References External links. Electronic Frontier Foundation | Defending Freedom in the Digital World.