Anyone with a basic understanding of computer networks can tell you that you cannot trace DoS like that. Especially if it is DDoS, where it is usually a bunch of unsecure devices that attack in a group, which is called a botnet.
If you are just sending stuff to overload it, you do not need to include the real return address. Elon is just expecting the majority of people will not understand any fancy computer word he says. He has proven to know nothing about computers when he bought the twitter and he has proven it by this absolutely ridiculous claim.
He has proven to know nothing about computers when he bought the twitter and he has proven it by this absolutely ridiculous claim.
He’s proven it a few times by now.
One of my favorite demonstrations of his lack of self-awareness is when he made a Twitter reply saying “the government doesn’t use SQL, [ableist slur]”. It’s easily and provably wrong while also demonstrating what a rotten pile of shit he is.
Arguably you want to spoof the address/es of someone else you want also want to attack as the return address so that the person you attack starts responding to that address and I directly flooding them, particularly if you’re trying to DoS something like Twitter.
Anyone with a basic understanding of computer networks can tell you that you cannot trace DoS like that. Especially if it is DDoS, where it is usually a bunch of unsecure devices that attack in a group, which is called a botnet.
If you are just sending stuff to overload it, you do not need to include the real return address. Elon is just expecting the majority of people will not understand any fancy computer word he says. He has proven to know nothing about computers when he bought the twitter and he has proven it by this absolutely ridiculous claim.
He’s proven it a few times by now.
One of my favorite demonstrations of his lack of self-awareness is when he made a Twitter reply saying “the government doesn’t use SQL, [ableist slur]”. It’s easily and provably wrong while also demonstrating what a rotten pile of shit he is.
Of course! I only picked my favorite one where he rated developers based on the number of rows they committed to git.
Arguably you want to spoof the address/es of someone else you want also want to attack as the return address so that the person you attack starts responding to that address and I directly flooding them, particularly if you’re trying to DoS something like Twitter.