DerpTrolling
   HOME





DerpTrolling
Austin Thompson, known as DerpTrolling, is a hacker that was active from 2011 to 2014. He largely used Twitter to coordinate distributed denial of service attacks on various high traffic websites. In December 2013 he managed to bring down large gaming sites such as League of Legends in an attempt to troll popular livestreamer PhantomL0rd (James Varga). Public reaction to his presence has been generally negative, largely owing to the unclear nature of his motives. After pleading guilty to charges of hacking in 2018, he was sentenced to 27 months in federal prison, as well as being required to pay $95,000 in restitution. Attacks Initially, Derp sent a few tweets using the Twitter account “DerpTrolling” to indicate that he were going to bring down the popular gaming website League of Legends. his first attack however, was on a game called Quake Live. Hours afterwards, many of the League of Legends game server regions in North America, Europe, and Oceania, as well as the webs ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Distributed Denial Of Service
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. The range of attacks varies widely, spanning from inundating a server with millions of requests to slow its performance, overwhelming a server with a substantial amount of invalid data, to submitting requests with an illegitimate IP address. In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. More sophisticated strategies are required to mitigate this type of attack; simply attempting to block a single source is insufficient ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  



MORE