Within this simple tutorial I’ll make clear how to use LOIC, this program that  usually uses Private to release known DDoS problems.
To begin with, let’s know very well what a DDos harm is:
DDoS means Distributed Denial of Service Distributed Denial of Service Episode.

But what do these kind of attacks contain? Very easy: any computer has a handling capacity limit, so when it surpasses that limit may cause overloads.

And the machines, although very powerful, remain computers.
In what it is made up then, is by using the make of the collection to overload one or a couple of servers so the destination website is inoperative.
The legality of the type of problems has been questioned, nevertheless, you that they don’t do any harm, nor can grab information with them.

How exactly does it work?

The first rung on the ladder is to disable the antivirus because this program is diagnosed as a computer virus.
We downloaded this program here …
https://github.com/NewEraCracker/LOIC
or
https://sourceforge.net/assignments/loic/
Once downloaded, we unzip it and run it.
From here there are 2 ways to strike:

Automatic:

Important data for working DDoS disorders are: IRC Server: here moves the server url Dock: this is actually the dock, generally it is 6667. anonymous
Route: by default it is #loic, but sometimes it changes.
The organizers of the DDoS problems supply them. In this manner, it is all programmed. They control the episodes from their Laptop or computer and immediate them to where they need.After the data is put, we make IRC Function (HiveMind).This program will only hook up and begin DDoS attacks.

Manual:

First you must type in the URL the website that people want to harm (in Web address, within Selected Concentrate on). For instance, yourwebsite.com, or any website! (certainly, do not undertake it).
Therefore we should bring in www.yourwebsite.com
Once the Web address is entered, select Lock on, and in Selected Goal an IP can look (lots segregated by dots). Then press IMMA CHARGIN MAH LAZER. This program will only hook up and start introducing DDoS attacks.