What steps will reproduce the problem?
Vicious? Crack? Bruteforce?
What is the expected output?
The only possible use for this software is to attempt to hack other
networks. What is worse it will usually be launched from someone else's
system. Nobody will run it from their own computer.
It is a hacker tool.
Please remove it as it is being used to launch denial of service attacks on
our network.
Thanks
Original issue reported on code.google.com by jim.pick...@gmail.com on 13 Nov 2008 at 12:07
Original issue reported on code.google.com by
jim.pick...@gmail.com
on 13 Nov 2008 at 12:07