Wednesday, May 18, 2016

A Message to all The Peoples of Bangladesh by Mr. S1CK aka EHK


Hello All Bangladeshis!
Greetings,This is we. Now the time comes, Its the time to Pay Back my dr warriors! Get rdy for the Attack. No one is bigger then you. You are the King of Your Kingdom. No instruction required. Just be known about hiding your Internet Protocol [IP]. Wr a mask by using a new IP. No body will find you. Use TOR, HSS whatever you would like to but be safe. Never forget that we are by born Warriors. Attack India as much as you can.
The things you have to do:
1. Who ever is using LOIC like me, plse be sure that you have protected your self before you do something. So here I have come with a solution to hide your Internet Protocol (IP) Address plse use this. How to use it you will find everything in this post. Share it and Download it, use it and Use LOIC to BANG Indian website's. Any One of them!
[A] http://arazstenblog.blogspot.com/2010/11/website-blocked-no-problem.html
[B] https://www.torproject.org/
2. Download LOIC (Low Orbit Ion Cannon) [If you don't have it!]http://ow.ly/6u5B5
We want to make a history. What we can do and what we can perform its depends on out capabilities. Keep your expectation high.
We will attack website through DDoS. Lets know what is it?
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer or network resource unavailable to its intended users. Although the mns to carry out, motives for, and targets of a DoS attack may vary, it erally consists of the concerted efforts of a person, or multiple people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. The term is erally used relating to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.One common method of attack involves saturating the target machine with external communiions requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. Such attacks usually ld to a server overload. In eral terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communiion media between the intended users and the victim so that they can no longer communie adequately.Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations.When the DoS Attacker sends many packets of information and requests to a single network adapter, ch computer in the network would experience effects from the DoS attack.
Keep your Shield on. Attack on Indian Sites. Its an Operation. I am naming it Operation Cyber India #OpCyberIndia.


them by Phishing, Logging, DDoS, Own their sites etc ways of .
I am with you guys and always will be.
Thank you.Its Mr. S1CKaka.Edward Hanif Khan



We are Anonymous,We are Legion,We do not Forgive,We do not Forget,Expect us.
United by One,Divided by Zero.
[Its not a Message by Anonymous! Its a Message by Mr. S1CK]
Source: Mr.S1CK

No comments:

Post a Comment