Is there an effective difference between distributing a program that submits random information to an alleged phishing site a thousand times and distributing a DoS client, besides "Oh, but I don't like those people?"
Do all phishing sites live on their own boxes with their own IP addresses, leased lines, and networks, or is there a possibility that there are innocent bystanders nearby?
In reply to Re^3: Automatic phish form filler
by chromatic
in thread Automatic phish form filler
by Roy Johnson
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |