Rizon
Founded | July 2002 |
---|---|
Geographic location | Europe Canada United States Asia |
Based in | Worldwide |
Website URL | rizon |
Primary DNS | irc.rizon.net |
Average users | 18,000 – 21,000 |
Average channels | 22,000 – 25,000 |
Average servers | 20 |
Content/subject | Public/Unrestricted |
Rizon is a large
Rizon is popular with manyRizon IRCd
This section needs additional citations for verification. (January 2012) |
Rizon currently uses Plexus IRCd. Plexus was coded specifically with Rizon in mind and is based on ircd-hybrid. Plexus is not exclusive to Rizon as the IRCd is also used by other networks. Plexus versions 1.x and 2.x were originally coded by static & peer. Plexus 3.x was rewritten by ThaPrince and is now maintained and developed by the Rizon Dev Team.
As of the r524 release, the ability for automatic services authentication using SSL client certificates has been implemented, and was largely based on the work done by OFTC [citation needed], though significant changes were made regarding server-to-server communication.
Controversy
DDoS attack against mIRCX
This section needs additional citations for verification. (January 2012) |
In early 2004 the mIRCX and Aniverse
Contrary to rumors, Rizon had no part in a
DDoS attacks against rival networks
On May 25, 2007, as part of Operation: Bot Roast conducted by the FBI, Rizon's founder, Jason Michael Downey aka "Nessun" was charged with using a botnet in 2004 to launch Denial-of-service attacks (DDoS) against other computer networks, including rival IRC networks such as IRCHighway.[14][15][16][17][18]
On June 20, 2007, Downey pleaded guilty in a US Federal court to operating a botnet "of up to 6,000 infected computers" and using it to launch DDoS attacks "From on or about June 18, 2004 through on or about September 5, 2004." Downey faced up to 24 months in prison and a fine of up to $40,000.[14]
When asked his reasons behind performing the DDoS attacks, Downey explained to U.S. District Judge Nancy G. Edmunds that "I was doing it because I could, more than anything," and "It was a dumb thing to do."[19]
Downey was sentenced on October 23, 2007, to 12 months in prison for causing over $20,000 in losses and damages due to unlawful computer intrusion and was ordered to pay a total of $21,110 in damages to 3 companies that were affected by his DDoS attacks. After his release, Downey will have a probation term of 3 years with no computer access without prior permission and will have to perform 150 hours of community service.[14][15][20][21][22]
References
- ^ "IRC Networks - Top 100". Retrieved 2011-11-15.
- ISBN 978-1-59749-017-7.
- ISBN 978-1-59749-017-7.
- ISBN 978-1-59327-050-6.
Three of the most popular networks used for file trading include Undernet, Rizon, and EFnet.
- ISBN 978-1-59749-017-7.
- ISBN 0-16-075976-5.
- ^ Office of the United States Trade Representative (2006-03-31). "National Trade Estimate Report on Foreign Trade Barriers, 2006" (PDF). p. 263. Archived from the original (PDF) on January 14, 2009. Retrieved 2009-03-07.
- ^ "Why irc.mircx was shut down". 20 February 2004. Archived from the original on 25 September 2012. Retrieved 8 November 2015.
- ^ Poulsen, Kevin (2004-08-26). "FBI busts alleged DDoS Mafia". SecurityFocus. Retrieved 2009-03-02.
- ^ "UNITED STATES OF AMERICA v. PAUL G. ASHLEY, JONATHAN DAVID HALL, JOSHUA JAMES SCHICHTEL, RICHARD ROBY and LEE GRAHAM WALKER" (PDF). 2004-09-25. Retrieved 2009-03-02.
- Wired News. Retrieved 2009-03-02.
- Washington Post. Retrieved 2009-03-02.
- ^ "FooNET/HTTPD/CIT updates and information". Retrieved 2009-03-02.
- ^ a b c "UNITED STATES OF AMERICA v. D-1 JASON MICHAEL DOWNEY". 2007-05-25. Archived from the original on 2008-08-29. Retrieved 2009-03-02.
- ^ a b "Nessun Goes to Jail". IRC-Junkie.org. 2007-10-27. Archived from the original on 2009-02-23. Retrieved 2009-03-02.
- ^ FBI National Press Office (2007-06-13). "Over 1 Million Potential Victims of Botnet Cyber Crime". Press Release. Federal Bureau of Investigation. Archived from the original on February 21, 2009. Retrieved 2009-03-02.
Jason Michael Downey of Covington, Kentucky, is charged with an Information with using botnets to send a high volume of traffic to intended recipients to cause damage by impairing the availability of such systems. (FBI Detroit)
- Wired News. Retrieved 2009-03-02.
- ^ Acohido, Byron (2007-06-13). "FBI cracks down on 'bot herders'". USA Today. Retrieved 2009-03-02.
- ^ "Nessun: "Because I Could"". IRC-Junkie.org. 2007-06-26. Archived from the original on 2009-02-23. Retrieved 2009-03-02.
- ^ FBI National Press Office (2007-11-29). ""Bot Roast II" Nets 8 Individuals". Press Release. Federal Bureau of Investigation. Retrieved 2009-03-02.
Downey operated Internet Relay Chat (IRC) network Rizon. Downey stated that most of the attacks he committed were on other IRC networks or on the people that operated them.
- CNET News. Retrieved 2009-03-02.
- ^ Brandt, Andrew (2007-12-17). "True crime: The botnet barons". InfoWorld. p. 5. Archived from the original on 2008-06-18. Retrieved 2009-03-02.