Pentagon programmers developed a countermeasure for the Sept 9th FloodNet performance. The Electronic Disturbance Theater believes the following is what happened: A Java Applet named "Hostile Applet" was placed in the Pentagon' web site that was designed to activate whenever Flood Net was directed toward it. Upon activation, the Pentagon site would open the same blank window over and again on the Flood Net users browser. This crashed the browser instantly. As of this time, EDT is focusing its strategy on nomadic targeting. The Mexican Government or programmers hired by the government developed a countermeasure for the June 10 Flood Net target, Secretaria de Gobernacion's web site. The Electronic Disturbance Theater believes the following is what happened: JavaScript was placed in the Secretaria de Gobernacion's web site that was designed to activate whenever Flood Net was directed toward it. Upon activation, the Gobernacion site would open window after window on the Flood Net users browser. If the Flood Net user remained connected long enough, their browser, whether it be Netscape or Explorer, could crash. As of this writing EDT software designers are working to correct the problem in an attempt to make this sort of countermeasure in future actions ineffective. |
|||||
Turning JavaScript Off
|
Enter FloodNet
FloodNet website development by Internet artists
Carmin Karasic and
Brett Stalbaum