Hi There, > In the mean time, logging traffic to spot odd packets is a great idea. > People > should document and publish malicious traffic from their networks.
To be 100 % sure, this has to include a professional pentester who checks the traffic. Because methods to hide "malicious traffic" inside the "allowed traffic" do exist. Gerd
