29:
is a computer security specialist. Mixter first made the transition out of the computer underground into large-scale public awareness, in 2000, at which time newspapers and magazines worldwide mentioned a link to massively destructive and effective
113:
encrypted links. As an example, the distribution includes a program which will act as a web proxy, but all of the connections will be hidden until they reach the far end trusted peer.
71:
300:
Mixter. "The Six/Four System; A Decentralized
Anonymous Peer-To-Peer Network Infrastructure With Trust," README file in Six/Four distribution, 2003.
328:
247:
84:(TFN) and an update called TFN2K were ultimately discovered as being the ones used in the attacks, causing an estimated $ 1.7 billion
190:
167:
31:
195:
333:
110:
313:
81:
252:
103:
228:
138:
191:
Probe
Focuses on Prime Hacking Suspects - Investigation hampered by bogus attack bragging
151:
233:
322:
171:
106:
76:
209:
270:
164:
133:
289:
152:
The "Tribe Flood
Network" distributed denial of service attack tool, An Analysis
95:
92:
99:
47:
20:
275:
80:(Barbed Wire). Although Mixter himself was not a suspect, his tool, the
257:
109:. It works by using "trusted peers" to relay network connections over
55:
51:
39:
34:(DDoS) attacks which crippled and shut down major websites (including
35:
176:
63:
59:
43:
214:
85:
67:
91:
In 2002 Mixter returned to the public eye, as the author of
74:(NIPC) was questioning Mixter regarding a tool called
288:Mixter. "Six/Four System Protocol Specs," 2003.
154:David Dittrich, University of Washington, 1999
248:Hackers release software to battle censorship
8:
72:National Infrastructure Protection Center
70:). Early reports stated that the FBI-led
122:
128:
126:
7:
14:
229:A New Code for Anonymous Web Use
165:Author of Web Attack Tool speaks
134:Hacker inquiry leads to Germany
1:
329:Computer security specialists
32:distributed denial of service
16:Computer security specialist
98:. The Six/Four System is a
350:
18:
218:news, September 13, 2001.
210:'Mafiaboy' hacker jailed
196:San Francisco Chronicle
180:news, February 9, 2000.
237:online, July 12, 2000.
227:Schachtman, Noah. "
199:, February 15, 2000.
142:, February 13, 2000.
82:Tribe Flood Network
19:For the title, see
253:Houston Chronicle
189:Wallack, Todd. "
163:Lemos, Robert. "
341:
314:Personal website
301:
298:
292:
286:
280:
279:, July 15, 2002.
271:Hackers Take Aim
267:
261:
260:, July 15, 2002.
244:
238:
225:
219:
206:
200:
187:
181:
161:
155:
149:
143:
130:
349:
348:
344:
343:
342:
340:
339:
338:
319:
318:
310:
305:
304:
299:
295:
287:
283:
268:
264:
245:
241:
226:
222:
207:
203:
188:
184:
162:
158:
150:
146:
139:BBC News Online
131:
124:
119:
96:Six/Four System
24:
17:
12:
11:
5:
347:
345:
337:
336:
331:
321:
320:
317:
316:
309:
308:External links
306:
303:
302:
293:
281:
262:
239:
220:
201:
182:
170:2007-08-11 at
156:
144:
121:
120:
118:
115:
15:
13:
10:
9:
6:
4:
3:
2:
346:
335:
334:Living people
332:
330:
327:
326:
324:
315:
312:
311:
307:
297:
294:
290:
285:
282:
278:
277:
272:
266:
263:
259:
255:
254:
249:
243:
240:
236:
235:
230:
224:
221:
217:
216:
211:
205:
202:
198:
197:
192:
186:
183:
179:
178:
173:
172:archive.today
169:
166:
160:
157:
153:
148:
145:
141:
140:
135:
129:
127:
123:
116:
114:
112:
108:
105:
101:
97:
94:
93:Hacktivismo's
89:
87:
83:
79:
78:
73:
69:
65:
61:
57:
53:
49:
45:
41:
37:
33:
28:
22:
296:
284:
274:
265:
251:
242:
232:
223:
213:
204:
194:
185:
175:
159:
147:
137:
90:
88:in damages.
77:Stacheldraht
75:
26:
25:
323:Categories
117:References
102:resistant
100:censorship
21:Mx (title)
276:CBS News
168:Archived
258:Reuters
104:network
56:MSN.com
52:E-Trade
40:Buy.com
48:Amazon
36:Yahoo!
27:Mixter
234:Wired
177:ZDNet
107:proxy
64:ZDNet
66:and
60:Dell
44:eBay
250:,"
231:,"
215:BBC
212:",
193:,"
174:",
136:",
111:SSL
86:USD
68:CNN
325::
273:"
125:^
62:,
58:,
54:,
50:,
46:,
42:,
38:,
291:.
269:"
256:/
246:"
208:"
132:"
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.