As the tools employed within the pro-Wikileaks distributed denial-of-service attacks highlight, attack software is getting insanely simple to deploy and use. How was it that a loosely-coupled group of ...