To carry out the assault the hacker would first identify a target system and then create an army of bots spoofing its IP address.
BBC: Viewpoint: How hackers could decapitate the internet
应用推荐
模块上移
模块下移
不移动