Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.
We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
Revek (133289) writes "I am the sysadmin for a small ISP. We have limited resources to fight ddos attacks. Now on a weekly basis we get hit with huge ddos attacks that never last more than a few minutes. The traffic sometimes knocks our provider off up the line. What we have discovered is that people, mostly kids are using sniffers to get the ip address of their fellow xbox party members ip address and using a stresser/booster site to knock the other party off. There are numerous videos on youtube that explains how to do it, including this jewel from a youtube user with a prophetic handle. The domains and websites are all based outside the US. Panama seems to be the prefered country to register them. My contact with these sites has resulted threats and extortion attempts. The FBI contact I have sent me to ic3.gov to fill out a complaint form that was really more for reporting consumer fraud. Microsoft tried to send me to their website to sign in to my account(I dont have one) and report it. These sites have no legitimate use as far as I can see and result in disruption of more than just someones gaming experience. My question to slashdot is; what other options do I have to eliminate/mitigate this problem other than canceling our customers accounts?" top
Revek writes "I run a small one man computer repair buisness. I mainly clean and reload machines that have been infected with malware. Most machines have some form of p2p filesharing sofware installed on them. Although I shut them down sometimes they run for a while when I am otherwise occupied. I recently received a letter from my isp concerning distribution of copyrighted material. The mac address provided by them was not one of my machines. Am I responsible for p2p filesharing taking place on my customers machines?"