DOS trace

General technological topics without their own forum go here

Re: DOS trace

Post by fashizzlepop on Sun Dec 26, 2010 7:00 pm
([msg=51186]see Re: DOS trace[/msg])

In terms of DoS attacks, it seems most pokey to go with your second option, as all DoS attacks go across a "network" and then exPloit among the layers of the victim (4 or 7, what have you).
The glass is neither half-full nor half-empty; it's merely twice as big as it needs to be.
User avatar
Posts: 2303
Joined: Sat May 24, 2008 1:20 pm
Blog: View Blog (0)


Return to General

Who is online

Users browsing this forum: No registered users and 0 guests