|
One method:
Step 1: gather servers with security holes. Many around, even the old unpatched IIS servers which you can gather with a 10-line bash script. Several minutes to gather enough.
Step 2: ddos attack.
So easy everyone - and I do mean everyone - could do it.
__________________
/(bb|[^b]{2})/
|