From: Udo (ccie_groupstudy@yahoo.de)
Date: Fri Dec 01 2006 - 04:04:16 ART
Hi Group,
If I want to track back to the source of a SMURF attack, what is the
best solution ?
Also what are the recommended features for tracking back to the source
of an attack...
THX
Udo
This archive was generated by hypermail 2.1.4 : Tue Jan 02 2007 - 07:50:36 ART