Hi,
now what are the more useful methods to identify the P2P traffic?
In addition to the methods based on the payload inspection (signatures 
methods) and the heuristic methods (based on some general behavior of P2P 
traffic) there are some new approach to this issue?


regards,
      Steve "tder" Almasi

_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to