A new article has been added to WindowSecurity.com:
Title: Analyzing a Hack from A to Z (Part 2)
Author: Don Parker
Link: http://www.WindowSecurity.com/articles/Analyzing-Hack-Part2.html
Summary: We will finish analyzing the scan packet trace to pull out all the profiling information, and begin the network attack.
Visit the Subscription Management (http://newsletter.isoftmarketing.com/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsecurity.com
Copyright © WindowSecurity.com 2008. All rights reserved.
No comments:
Post a Comment