Talk:BWRaeper.NET

From /i/nsurgency W/i/ki
Jump to navigationJump to search

/*TODO*/ step 1: write an application to open port 80 on local machine and run through a list of proxies culled from the depths of the interntron to test that they: A) work; B) do not pass x-forward (whatever it was - to ensure MAXIMUMS ANONYMITY)

step 2: using that list, commence raping of target website, terminating the connection with the proxy server and re-establishing after the confirmation of incoming data (i.e. - keep the connection open as long as possible to at least download something so that your downstream isn't getting flooded with that bullshit and to verify that the proxy won't drop the data like a hot potato as soon as YOU terminate the connection)

REPEAT


Now you have the successful one-two punch combination of the erstwhile's cafe counter intelligence's Jackhammer and CCI proxy checker applications which ruinated many a website