I do not think this is a cool use of Perl.It is like a child with a box of matches who burns the house down, just to show he can. Perl gives you great power, but with this power must come great responsibility. Meditate a bit on that and then come back as a better and more humble self.
CountZero A program should be light and agile, its subroutines connected like a string of pearls. The spirit and intent of the program should be retained throughout. There should be neither too little or too much, neither needless loops nor useless variables, neither lack of structure nor overwhelming rigidity." - The Tao of Programming, 4.1 - Geoffrey James
| [reply] [Watch: Dir/Any] |
| [reply] [Watch: Dir/Any] |
I just want to point out a few other tools for network diagnosis, of which I hope that they are less harmful if accidentally mis-used:
- iperf for TCP performance testing
- netcat, the swiss army knife of network connections
- nmap for port scanning
I have yet to find a legitimate use for a network flooder, except defense testing.
| [reply] [Watch: Dir/Any] |
"I have yet to find a legitimate use for a network flooder"
Unless the desired effect was to be almost killed by a neighbour, in which case, mission accomplished :P
| [reply] [Watch: Dir/Any] |
the whole point is illegitimate use :-) .... like what would james bond use if he had to take out osama's network?
| [reply] [Watch: Dir/Any] |
.... i always wondered how someone might do that ;-)even though i agree that this code should be reaped....i'm glad i got a copy first ..... who knows? .....it could come in handy as a training script for network defense engineers
| [reply] [Watch: Dir/Any] |