A similar attack used to be able to be done in Windows by creating a batch file that calls itself at the end.
We used to do it where it would open the command prompt several times and then call itself, so after a couple seconds you would have dozens or hundreds of command prompt windows opening. On a system that only had 128 megs of RAM it didn’t take long for the system to become unresponsive.
Then make a shortcut, call it Internet Explorer with the blue E, and wait.
I also wrote a script that would create 1000 folders in your network drive and then change the owner so you couldn’t delete them. We used that one when people left their machine unlocked.
A similar attack used to be able to be done in Windows by creating a batch file that calls itself at the end.
We used to do it where it would open the command prompt several times and then call itself, so after a couple seconds you would have dozens or hundreds of command prompt windows opening. On a system that only had 128 megs of RAM it didn’t take long for the system to become unresponsive.
:loop notepad.exe goto loopThen place the .bat in the startup folder
Pulling the script out of the vague recesses of my brain, what we did was more like:
Then make a shortcut, call it Internet Explorer with the blue E, and wait.
I also wrote a script that would create 1000 folders in your network drive and then change the owner so you couldn’t delete them. We used that one when people left their machine unlocked.