Jump to content

Recommended Posts

Posted

55555555 :D:D

we have a wondeful tool, but we have timed bombs inside, we don't know how to deal with this threats.

please be cautious.

good luck to you all ...

internet president (in near future) :o

francois

Posted

I loved the technicals ... :D

Application layer protocols that are critically affected are those that:

•  Depend on long lived TCP connections

•  Have known or easy-to-guess IP address end points

•  Have easy to an easy-to-guess source TCP port

nice to be online 24/24 :o

francois

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.



×
×
  • Create New...