Write two paragraphs describing the circumstances surrounding a documented attack that took advantage of a TCP/IP protocol weakness. The first paragraph should identify who was attacked, where it took place, and when. The second paragraph briefly describes the protocol weakness used in the attack.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here