This article is set to arm you with the knowledge that allows one to approach a packet stream and successfully be able to determine if there are any missing packets. This is imperative in cases where your data set is missing packets that may contain crucial indicators of the breach. You would only know that by doing the analysis shown below.
Wednesday, October 19, 2005
Packet forensics using TCP:
Mozilla and hypocrisy
Right, but what about the experiences that Mozilla chooses to default for users like switching to Yahoo and making that the default upon ...
-
via VMware blog
-
AJAX: redesign your PHP applications? - ThinkPHP /dev/blog : "First of all, XMLHttpRequest has a problem: in InternetExplorer, it doesn...