Hmm..

Your question is a very general one. I'd suggest
looking this up on google first, and then checking out
the relevant links on countering SYN attacks. 

Apart from that, your IDS would've definitely logged
such packets, in which case you can figure out alot of
information from the logs, and using any analyzers.
How to use it? Suggest going to
www.security-forums.com and read a couple of their
defence articles. They're pretty good.

--
vik


=====
viksit gaur                   http://viksit.tripod.com        
[EMAIL PROTECTED]
[EMAIL PROTECTED]

Linux. The choice of a GNU generation. 
New eh?
I tried sniffing coke once, but the ice cubes seemed to get in the way...

__________________________________
Do you Yahoo!?
Yahoo! SiteBuilder - Free, easy-to-use web site design software
http://sitebuilder.yahoo.com

_______________________________________________
ilugd mailing list
[EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd

Reply via email to