Has anyone every tried to trace the source of a spoofed DOS attack?
I've got someone with a spoofed IP address trying to tunnel into my network with service 4 and 94.
Is protocol 4 and 94 tunneling protocols?
Has anyone every tried to trace the source of a spoofed DOS attack?
I've got someone with a spoofed IP address trying to tunnel into my network with service 4 and 94.
Is protocol 4 and 94 tunneling protocols?