Hi, now what are the more useful methods to identify the P2P traffic? In addition to the methods based on the payload inspection (signatures methods) and the heuristic methods (based on some general behavior of P2P traffic) there are some new approach to this issue?
regards,
Steve "tder" Almasi
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers
