Knowledge

IRC flood

Source πŸ“

205:(see below). Since some clients separate the private conversations into another window, each new message could open a new window for every new user a message is received from. This is exploitable by sending messages from multiple names, causing the target client to open many new windows and potentially swamping the user with boxes. Sometimes the easiest way to close all the windows is to restart the IRC client, although scripts (client extensions) exist to 'validate' unknown nicknames before receiving messages from them. 262: 189: 25: 110: 168:
operates entirely independent of anything but the raw internet connection and its IP protocol (of which ICMP is a subset). Even so, the actual IP address to flood (the address of the victim's connection) is frequently obtained by looking at the victim's user information (e.g. through the /whois or /dns command) on the IRC network.
167:
data exceeding the connection's capacity, potentially causing a disconnection from the IRC network. For the duration of the attack, the user's internet connection remains hindered. Technically speaking, this is not an IRC flood, as the attack itself doesn't traverse the IRC network at all, but
138:
is implemented in almost every client, most users respond to CTCP requests. By sending too many requests, after a couple of answers they get disconnected from the IRC server. The most widely used type is CTCP PING, although some clients also implement other CTCP replies.
184:
This is the simplest type of IRC flooding. It involves posting large numbers of posts or one very long post with repetitive text. This type of flood can be achieved, for example, by copying and pasting one short word repeatedly.
843:
Maynor, David; James, Lance; Spammer-X; Bradley, Tony; Thornton, Frank; Haines, Brad; Baskin, Brian; Bhargava, Hersh; Faircloth, Jeremy; Edwards, Craig; Gregg, Michael; Bandes, Ron; Das, Anand M.; Piccard, Paul (November 2006).
93:
an IRC channel from the original founders of the channel. The first attacks generally used a modified IRC client or an application to flood a channel or a user. Later they started to be based on
151:
requests simultaneously. Theoretically it can also be used to disconnect users, because the target client sends information back about what port is intended to be used during the DCC session.
1008:
Baskin, Brian; Bradley, Tony; Faircloth, Jeremy; Schiller, Craig A.; Caruso, Ken; Piccard, Paul; James, Lance (2006-09-19). Piltzecker, Tony (ed.).
126:
Connecting and disconnecting from a channel as fast as possible, therefore spamming the channel with dis/connect messages also called q/j flooding.
1079: 952: 833: 1379: 1128: 1297: 1048: 1021: 998: 975: 923: 900: 865: 814: 791: 764: 737: 706: 683: 656: 627: 596: 567: 534: 305: 283: 164: 1040: 486: 448: 407: 1101: 1058:
Schiller, Craig A.; Binkley, Jim; Harley, David; Evron, Gadi; Bradley, Tony; Willems, Carsten; Cross, Michael (2007-02-15).
361: 381: 81:'), or just disrupting users. Floods can either be done by scripts (written for a given client) or by external programs. 90: 322: 341: 615: 98: 1661: 1236: 1149: 160: 135: 37: 1175: 1121: 783: 756: 698: 276: 270: 1241: 1067: 1013: 853: 725: 675: 148: 287: 729: 806: 188: 78: 1548: 1461: 944: 888: 500: 462: 421: 201:
Sending massive numbers of private messages to the victim, mainly from different connections called
1666: 1614: 1412: 1137: 1114: 940: 884: 857: 671: 619: 70: 1594: 1466: 779: 752: 892: 101:. This later moved on to starting IRC-based botnets which were capable of DDoS and IRC floods. 1609: 1075: 1071: 1044: 1017: 994: 971: 948: 919: 896: 861: 829: 810: 787: 760: 733: 702: 679: 652: 648: 638: 623: 592: 588: 578: 563: 559: 555: 545: 530: 526: 230: 74: 1420: 1389: 490: 452: 438: 411: 1543: 1497: 915: 584: 846: 608: 24: 1682: 1384: 1251: 1165: 990: 824:
Harold F. Tipton, Micki Krause. (2007-05-14). Tipton, Harold F.; Krause, Micki (eds.).
551: 522: 46: 964:
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses
1715: 1060: 967: 934: 877: 221:
Changing the nick as fast as possible, thus disrupting conversation in the channel.
1721: 1702: 1528: 1210: 1205: 1190: 717: 401: 240: 114: 442: 480: 1573: 1292: 644: 503: 465: 424: 365: 163:
flood. This attack overloads the victim's internet connection with an amount of
580:
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
1604: 1476: 1363: 1195: 385: 716:
Piccard, Paul; Baskin, Brian; Edwards, Craig; Spillman, George (2005-05-01).
1656: 1589: 1282: 1106: 326: 345: 109: 1538: 1471: 1430: 1327: 1317: 1302: 1277: 1231: 1185: 403:
A Discussion on Computer Network Conferencing: 5.2.6 Network Friendliness
73:
network is a method of disconnecting users from an IRC server (a form of
1630: 1563: 1558: 1451: 1353: 1348: 1343: 1322: 1170: 1036: 245: 94: 1640: 1599: 1518: 1312: 1287: 1267: 495: 457: 416: 749:
Hacking Exposed 5th Edition: Network Security Secrets And Solutions
89:
The history of Internet Relay Chat flooding started as a method of
1687: 1635: 1568: 1553: 1533: 1523: 1513: 1492: 1425: 1307: 1272: 1031:
HΓΆΓΆk, Kristina; Benyon, David; Munro, Alan J., eds. (2003-01-31).
482:
Internet Relay Chat: Server Protocol: 5.8 Flood control of clients
235: 187: 108: 1456: 1435: 1246: 1226: 1200: 1110: 1358: 640:
The Virtual Community: Homesteading on the Electronic Frontier
255: 18: 1096: 747:
McClure, Stuart; Scambray, Joel; Kurtz, George (2005-04-19).
1033:
Designing Information Spaces: The Social Navigation Approach
176:
Sending disruptive numbers of invites to a certain channel.
985:
King, Todd; Tittel, Ed; Bittlingmeier, David (2003-04-06).
933:
Douligeris, Christos; Serpanos, Dimitrios N. (2007-06-15).
444:
Internet Relay Chat Protocol: 8.10 Flood control of clients
774:
Scambray, Joel; Shema, Mike; Sima, Caleb (2006-06-05).
213:
Similar to the message, but uses the "notice" command.
77:), exhausting bandwidth which causes network latency (' 42: 936:
Network Security: Current Status and Future Directions
695:
Cyberlines 2.0: Languages and Cultures of the Internet
801:
Tipton, Harold F.; Krause, Micki, eds. (2004-12-28).
848:
Emerging Threat Analysis: From Mischief to Malicious
693:
Gibbs, Donna; Krause, Kerri-Lee, eds. (2006-06-01).
113:
A post flood on an IRC channel, repeating the term "
1675: 1649: 1623: 1582: 1506: 1485: 1444: 1405: 1398: 1372: 1336: 1260: 1219: 1158: 722:
Securing IM and P2P Applications for the Enterprise
547:
Malicious Mobile Code: Virus Protection for Windows
1059: 876: 845: 607: 529:. pp. 302, 98, 134, 170–172, 268–269, 300. 192:Example of a message flood using over 50 clones. 910:Northcutt, Stephen; Novak, Judy (2002-09-06). 1122: 8: 724:. foreword by Kevin Beaver (1st ed.). 1402: 1129: 1115: 1107: 1102:Flood protection and ignoring information 494: 456: 415: 306:Learn how and when to remove this message 16:Denial-of-service attack on Internet chat 826:Information Security Management Handbook 803:Information Security Management Handbook 668:Netaholics?: The Creation of a Pathology 269:This article includes a list of general 962:Skoudis, Ed; Liston, Tom (2006-01-02). 828:(6th ed.). Auerbach Publications. 147:This type consists of initiating many 67:Internet Relay Chat Flooding/Scrolling 7: 1016:: Syngress Publishing. p. 19. 1010:Combating Spyware in the Enterprise 637:Rheingold, Howard (October 1993). 342:"Logging and Reporting IRC Abuses" 275:it lacks sufficient corresponding 14: 776:Hacking Exposed: Web Applications 666:Surratt, Carla G. (1999-08-01). 544:Grimes, Roger A. (August 2001). 260: 23: 1070:: Syngress Publishing. p.  1041:Springer Science+Business Media 875:Bidgoli, Hossein (2003-12-23). 856:: Syngress Publishing. p.  479:Kalt, Christophe (April 2000). 805:. Vol. 2 (5th ed.). 360:Brinton, Aaron (August 1997). 1: 606:Crystal, David (2006-09-18). 321:Pioch, Nicolas (1993-02-28). 1062:Botnets: The Killer Web App 912:Network Intrusion Detection 517:Mutton, Paul (2004-07-27). 441:; Reed, Darren (May 1993). 159:Typically referred to as a 36:to comply with Knowledge's 1738: 616:Cambridge University Press 380:Powers, Ray (1998-07-30). 1700: 1662:Mozilla Application Suite 1145: 879:The Internet Encyclopedia 699:James Nicholas Publishers 610:Language and the Internet 577:(anonymous) (June 1997). 400:Reed, Darren (May 1992). 987:Security+ Training Guide 784:McGraw-Hill Professional 757:McGraw-Hill Professional 49:may contain suggestions. 34:may need to be rewritten 1068:Rockland, Massachusetts 1014:Rockland, Massachusetts 854:Rockland, Massachusetts 726:Rockland, Massachusetts 676:Nova Science Publishers 382:"The myths of opers..." 290:more precise citations. 117:" several hundred times 1650:Web browser components 193: 118: 1150:Comparison of clients 945:John Wiley & Sons 889:John Wiley & Sons 807:Auerbach Publications 560:188, 239–240, 242–243 362:"IRC Operators Guide" 191: 112: 1676:Library and plug-ins 1462:Microsoft Comic Chat 1097:mIRC script database 786:. pp. 370–373. 759:. pp. 494–497. 701:. pp. 270–271. 323:"A short IRC primer" 1667:Mozilla Thunderbird 1138:Internet Relay Chat 941:Hoboken, New Jersey 885:Hoboken, New Jersey 730:Syngress Publishing 672:Hauppauge, New York 780:New York, New York 753:New York, New York 194: 119: 1709: 1708: 1696: 1695: 1445:Microsoft Windows 1220:Related protocols 1081:978-1-59749-135-8 954:978-0-471-70355-6 835:978-0-8493-7495-1 439:Oikarinen, Jarkko 316: 315: 308: 231:Computer security 75:Denial of Service 64: 63: 38:quality standards 1729: 1403: 1390:Jarkko Oikarinen 1380:List of commands 1131: 1124: 1117: 1108: 1085: 1065: 1054: 1035:(1st ed.). 1027: 1012:(1st ed.). 1004: 981: 966:(2nd ed.). 958: 929: 914:(3rd ed.). 906: 883:(1st ed.). 882: 871: 851: 839: 820: 797: 778:(2nd ed.). 770: 751:(5th ed.). 743: 712: 697:(2nd ed.). 689: 662: 643:(1st ed.). 633: 614:(2nd ed.). 613: 602: 573: 540: 521:(1st ed.). 513: 511: 510: 498: 496:10.17487/RFC2813 475: 473: 472: 460: 458:10.17487/RFC1459 434: 432: 431: 419: 417:10.17487/RFC1324 396: 394: 393: 376: 374: 373: 364:. Archived from 356: 354: 353: 344:. Archived from 337: 335: 334: 325:. Archived from 311: 304: 300: 297: 291: 286:this article by 277:inline citations 264: 263: 256: 59: 56: 50: 27: 19: 1737: 1736: 1732: 1731: 1730: 1728: 1727: 1726: 1712: 1711: 1710: 1705: 1692: 1671: 1645: 1619: 1578: 1502: 1481: 1440: 1394: 1368: 1332: 1256: 1215: 1154: 1141: 1135: 1093: 1088: 1082: 1057: 1051: 1043:. p. 266. 1030: 1024: 1007: 1001: 984: 978: 961: 955: 932: 926: 916:SAMS Publishing 909: 903: 874: 868: 842: 836: 823: 817: 809:. p. 517. 800: 794: 773: 767: 746: 740: 715: 709: 692: 686: 678:. p. 156. 665: 659: 636: 630: 605: 599: 585:SAMS Publishing 576: 570: 543: 537: 516: 508: 506: 478: 470: 468: 437: 429: 427: 399: 391: 389: 379: 371: 369: 359: 351: 349: 340: 332: 330: 320: 312: 301: 295: 292: 282:Please help to 281: 265: 261: 254: 227: 219: 211: 199: 182: 174: 157: 145: 132: 124: 107: 105:Types of floods 87: 60: 54: 51: 41: 28: 17: 12: 11: 5: 1735: 1733: 1725: 1724: 1714: 1713: 1707: 1706: 1701: 1698: 1697: 1694: 1693: 1691: 1690: 1685: 1679: 1677: 1673: 1672: 1670: 1669: 1664: 1659: 1653: 1651: 1647: 1646: 1644: 1643: 1638: 1633: 1627: 1625: 1621: 1620: 1618: 1617: 1612: 1607: 1602: 1597: 1592: 1586: 1584: 1580: 1579: 1577: 1576: 1571: 1566: 1561: 1556: 1551: 1546: 1541: 1536: 1531: 1526: 1521: 1516: 1510: 1508: 1507:Cross-platform 1504: 1503: 1501: 1500: 1495: 1489: 1487: 1483: 1482: 1480: 1479: 1474: 1469: 1464: 1459: 1454: 1448: 1446: 1442: 1441: 1439: 1438: 1433: 1428: 1423: 1418: 1415: 1409: 1407: 1400: 1396: 1395: 1393: 1392: 1387: 1382: 1376: 1374: 1370: 1369: 1367: 1366: 1361: 1356: 1351: 1346: 1340: 1338: 1334: 1333: 1331: 1330: 1325: 1320: 1315: 1310: 1305: 1300: 1295: 1290: 1285: 1280: 1275: 1270: 1264: 1262: 1258: 1257: 1255: 1254: 1249: 1244: 1239: 1234: 1229: 1223: 1221: 1217: 1216: 1214: 1213: 1208: 1203: 1198: 1193: 1188: 1183: 1178: 1173: 1168: 1162: 1160: 1156: 1155: 1153: 1152: 1146: 1143: 1142: 1136: 1134: 1133: 1126: 1119: 1111: 1105: 1104: 1099: 1092: 1091:External links 1089: 1087: 1086: 1080: 1055: 1049: 1028: 1022: 1005: 999: 991:Que Publishing 982: 976: 959: 953: 930: 924: 907: 901: 872: 866: 840: 834: 821: 815: 798: 792: 771: 765: 744: 738: 713: 707: 690: 684: 663: 657: 634: 628: 603: 597: 574: 568: 556:O'Reilly Media 552:Sebastopol, CA 541: 535: 527:O'Reilly Media 523:Sebastopol, CA 514: 476: 435: 397: 384:Archived from 377: 357: 338: 317: 314: 313: 268: 266: 259: 253: 250: 249: 248: 243: 238: 233: 226: 223: 218: 215: 210: 207: 198: 195: 181: 178: 173: 170: 156: 153: 144: 141: 131: 128: 123: 120: 106: 103: 86: 83: 62: 61: 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 1734: 1723: 1720: 1719: 1717: 1704: 1699: 1689: 1686: 1684: 1681: 1680: 1678: 1674: 1668: 1665: 1663: 1660: 1658: 1655: 1654: 1652: 1648: 1642: 1639: 1637: 1634: 1632: 1629: 1628: 1626: 1622: 1616: 1613: 1611: 1608: 1606: 1603: 1601: 1598: 1596: 1593: 1591: 1588: 1587: 1585: 1581: 1575: 1572: 1570: 1567: 1565: 1562: 1560: 1557: 1555: 1552: 1550: 1547: 1545: 1542: 1540: 1537: 1535: 1532: 1530: 1527: 1525: 1522: 1520: 1517: 1515: 1512: 1511: 1509: 1505: 1499: 1496: 1494: 1491: 1490: 1488: 1484: 1478: 1475: 1473: 1470: 1468: 1465: 1463: 1460: 1458: 1455: 1453: 1450: 1449: 1447: 1443: 1437: 1434: 1432: 1429: 1427: 1424: 1422: 1419: 1416: 1414: 1411: 1410: 1408: 1404: 1401: 1397: 1391: 1388: 1386: 1383: 1381: 1378: 1377: 1375: 1371: 1365: 1362: 1360: 1357: 1355: 1352: 1350: 1347: 1345: 1342: 1341: 1339: 1335: 1329: 1326: 1324: 1321: 1319: 1316: 1314: 1311: 1309: 1306: 1304: 1301: 1299: 1296: 1294: 1291: 1289: 1286: 1284: 1281: 1279: 1276: 1274: 1271: 1269: 1266: 1265: 1263: 1259: 1253: 1250: 1248: 1245: 1243: 1240: 1238: 1235: 1233: 1230: 1228: 1225: 1224: 1222: 1218: 1212: 1209: 1207: 1204: 1202: 1199: 1197: 1194: 1192: 1189: 1187: 1184: 1182: 1179: 1177: 1174: 1172: 1169: 1167: 1164: 1163: 1161: 1157: 1151: 1148: 1147: 1144: 1139: 1132: 1127: 1125: 1120: 1118: 1113: 1112: 1109: 1103: 1100: 1098: 1095: 1094: 1090: 1083: 1077: 1073: 1069: 1064: 1063: 1056: 1052: 1050:1-85233-661-7 1046: 1042: 1038: 1034: 1029: 1025: 1023:1-59749-064-4 1019: 1015: 1011: 1006: 1002: 1000:0-7897-2836-2 996: 992: 988: 983: 979: 977:0-13-148104-5 973: 969: 968:Prentice Hall 965: 960: 956: 950: 946: 942: 938: 937: 931: 927: 925:0-7357-1265-4 921: 917: 913: 908: 904: 902:0-471-22201-1 898: 894: 890: 886: 881: 880: 873: 869: 867:1-59749-056-3 863: 859: 855: 850: 849: 841: 837: 831: 827: 822: 818: 816:0-8493-3210-9 812: 808: 804: 799: 795: 793:0-07-226299-0 789: 785: 781: 777: 772: 768: 766:0-07-226081-5 762: 758: 754: 750: 745: 741: 739:1-59749-017-2 735: 731: 727: 723: 719: 718:Sachs, Marcus 714: 710: 708:1-875408-42-8 704: 700: 696: 691: 687: 685:1-56072-675-X 681: 677: 673: 669: 664: 660: 658:0-201-60870-7 654: 650: 646: 642: 641: 635: 631: 629:0-521-86859-9 625: 621: 617: 612: 611: 604: 600: 598:1-57521-268-4 594: 590: 586: 582: 581: 575: 571: 569:1-56592-682-X 565: 561: 557: 553: 549: 548: 542: 538: 536:0-596-00687-X 532: 528: 524: 520: 515: 505: 502: 497: 492: 488: 484: 483: 477: 467: 464: 459: 454: 450: 446: 445: 440: 436: 426: 423: 418: 413: 409: 405: 404: 398: 388:on 2009-08-15 387: 383: 378: 368:on 2009-08-14 367: 363: 358: 348:on 2009-08-15 347: 343: 339: 329:on 2009-08-14 328: 324: 319: 318: 310: 307: 299: 289: 285: 279: 278: 272: 267: 258: 257: 251: 247: 244: 242: 239: 237: 234: 232: 229: 228: 224: 222: 216: 214: 208: 206: 204: 197:Message flood 196: 190: 186: 179: 177: 171: 169: 166: 162: 154: 152: 150: 142: 140: 137: 129: 127: 122:Connect flood 121: 116: 111: 104: 102: 100: 96: 92: 84: 82: 80: 76: 72: 68: 58: 48: 44: 39: 35: 32:This article 30: 26: 21: 20: 1529:Konversation 1180: 1159:Common terms 1061: 1032: 1009: 986: 963: 935: 911: 878: 847: 825: 802: 775: 748: 721: 694: 667: 639: 609: 579: 546: 518: 507:. Retrieved 481: 469:. Retrieved 443: 428:. Retrieved 402: 390:. Retrieved 386:the original 370:. Retrieved 366:the original 350:. Retrieved 346:the original 331:. Retrieved 327:the original 302: 293: 274: 241:Smurf attack 220: 212: 209:Notice flood 202: 200: 183: 175: 172:Invite flood 158: 146: 133: 125: 88: 66: 65: 55:January 2012 52: 43:You can help 33: 1574:Quassel IRC 1293:Libera Chat 891:. pp.  645:Basic Books 587:. pp.  558:. pp.  288:introducing 91:taking over 1605:Miranda NG 1477:Visual IRC 1385:Subculture 1364:UnrealIRCd 1337:Technology 1176:DoS attack 647:. p.  618:. p.  509:2009-05-25 471:2009-05-25 430:2009-05-25 392:2009-05-25 372:2009-05-25 352:2009-05-25 333:2009-05-25 271:references 252:References 217:Nick flood 180:Post flood 155:ICMP flood 130:CTCP flood 1657:ChatZilla 1624:Web-based 1590:Centericq 1486:Unix-like 1283:GameSurge 519:IRC Hacks 143:DCC flood 47:talk page 1716:Category 1703:Category 1615:Trillian 1583:Multi-IM 1539:LeafChat 1472:Shareaza 1431:Linkinus 1413:Colloquy 1373:See also 1328:Undernet 1318:SlashNET 1303:QuakeNet 1278:Freenode 1261:Networks 1232:MSN Chat 1211:Takeover 1206:Services 1191:Operator 1186:Netsplit 296:May 2009 225:See also 1631:CGI:IRC 1595:Empathy 1564:HexChat 1559:WeeChat 1549:Nettalk 1452:Bersirc 1399:Clients 1354:BitlBee 1349:Infobot 1344:Eggdrop 1323:Snoonet 1037:Germany 895:, 213. 720:(ed.). 589:140–141 284:improve 246:WinNuke 99:scripts 85:History 1641:Mibbit 1610:Pidgin 1600:Kopete 1519:BitchX 1313:RusNet 1288:IRCnet 1268:DALnet 1196:Script 1078:  1047:  1020:  997:  974:  951:  922:  899:  864:  832:  813:  790:  763:  736:  705:  682:  655:  626:  595:  566:  533:  273:, but 203:clones 134:Since 69:on an 45:. The 1688:rcirc 1636:PJIRC 1569:PJIRC 1554:Smuxi 1534:KVIrc 1524:Irssi 1514:Ayttm 1493:ircII 1467:PIRCH 1426:Ircle 1421:Homer 1406:macOS 1308:Rizon 1273:EFnet 1252:Ident 1181:Flood 1140:(IRC) 236:Flood 1544:naim 1457:mIRC 1436:Snak 1417:Fire 1298:OFTC 1247:XDCC 1237:CTCP 1227:IRCX 1201:IRCd 1076:ISBN 1045:ISBN 1018:ISBN 995:ISBN 972:ISBN 949:ISBN 920:ISBN 897:ISBN 862:ISBN 830:ISBN 811:ISBN 788:ISBN 761:ISBN 734:ISBN 703:ISBN 680:ISBN 653:ISBN 624:ISBN 593:ISBN 564:ISBN 531:ISBN 504:2813 487:IETF 466:1459 449:IETF 425:1324 408:IETF 165:ICMP 161:ping 136:CTCP 97:and 95:bots 1722:IRC 1683:ERC 1359:ZNC 1242:DCC 1171:Bot 1166:BNC 893:209 858:170 649:185 620:160 501:RFC 491:doi 463:RFC 453:doi 422:RFC 412:doi 149:DCC 115:OMG 79:lag 71:IRC 1718:: 1498:Ii 1074:. 1072:80 1066:. 1039:: 993:. 989:. 970:. 947:. 943:: 939:. 918:. 887:: 860:. 852:. 782:: 755:: 732:. 728:: 674:: 670:. 651:. 622:. 591:. 583:. 562:. 554:: 550:. 525:: 499:. 489:. 485:. 461:. 451:. 447:. 420:. 410:. 406:. 1130:e 1123:t 1116:v 1084:. 1053:. 1026:. 1003:. 980:. 957:. 928:. 905:. 870:. 838:. 819:. 796:. 769:. 742:. 711:. 688:. 661:. 632:. 601:. 572:. 539:. 512:. 493:: 474:. 455:: 433:. 414:: 395:. 375:. 355:. 336:. 309:) 303:( 298:) 294:( 280:. 57:) 53:( 40:.

Index


quality standards
You can help
talk page
IRC
Denial of Service
lag
taking over
bots
scripts

OMG
CTCP
DCC
ping
ICMP

Computer security
Flood
Smurf attack
WinNuke
references
inline citations
improve
introducing
Learn how and when to remove this message
"A short IRC primer"
the original
"Logging and Reporting IRC Abuses"
the original

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑