Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

First thought, isn't this a tad dangerous for the supplier? There seems to be nothing stopping me from using huge amounts of bandwidth just to screw with them. Or if I really was a bad guy, how much of an effective dos attack could be launched on ec2 hosted sites in the same az from these servers?


How would you use lots of bandwidth after you created the servers?


I downloaded a couple small files with wget and got 10MB/s, so just point it at a large file, maybe even loop the command.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: