...It is completely open source, as in take what you need from it, no limits!
So this is in essence a Denial of Service application, because of that you have to remember not to use this for malicious purposes, the program calls back home on first run, so don't do any funny business ;-D
Another thing to bear in mind when using this, is that you will have to have more bandwidth than the "victim", unless it is a really weak host you are flooding.
Some light reading on the subject: http://en.wikipedia.org/wiki/Denial-of-service_attack