TurboJunky
Fire the Federal Gov't
- Joined
- Nov 5, 2002
- Messages
- 5,104
Anyone have a good windows email bomb program??...or a link to download one?
By registering with us, you'll be able to discuss, share and private message with other members of our community.
SignUp Now!Originally posted by TT/A1233
Thanks, but I didn't say I wanted to email bomb anyone.
E-mail bombing in and of itself isn't a federal crime, just look at the unsuccessful attempts to outlaw SPAM at the federal level...no go so far. Who here hasn't been blasted with a mailbox full of unwanted/unsolicited email? A denial of service (DoS) attack must significant enough to show a loss of revenue or damage to a system, server, network or the like. There's a level of proof that must be met. At best, a bombardment of email that doesn't deny customer service is a violation of an ISPs TOS....nothing more.
Not to mention it isn't hard to hide an IP, MAC address and hack into someone's unsecure wireless system to accomplish such tasks....but that's another story altogether. Linux is a scary tool...
Originally posted by TT/A1233
Not to mention it isn't hard to hide an IP, MAC address and hack into someone's unsecure wireless system to accomplish such tasks....but that's another story altogether. Linux is a scary tool...
Originally posted by GN One Day...
Okay, I admit, I didn't know what email bombing was. Please, no need to demonstrate. So, to Google I went for education. I thought this was a funny definition (no offense intended):
Traits of an Internet Mail-Bomber
The typical Internet mail-bomber is a junior or senior in high school, or freshman in college. They hold radical beliefs that are far to the left or right and do not take well to constructive criticisms. Maladjusted to their environment and preferring social isolation, their felonious handles protect them from person-to-person relationships as they frequent the Usenet newsgroups.
Stereotypically, they are also technocratic elitists who take pleasure in the "dark side" of the Internet (including computer hacking, theft of service from telephone utilities, and credit card fraud). They feel their power is derived from their ability to adversely affect your daily life. With their inflated egos they attempt to cause mischief while hiding behind their shield of anonymity.
LMAO! I think the author has been a victim a few too many times.