At 08:03 AM 05/11/2000 +0530, Udhay Shankar N wrote:
>http://www.firstmonday.dk/issues/issue2_5/rowland/
>
>The TCP/IP protocol suite has a number of weaknesses that allow an attacker
>to leverage techniques in the form of covert channels to surreptitiously
>pass data in otherwise benign packets.
Date: Thu, 11 May 2000 08:03:37 +0530
From: Udhay Shankar N <[EMAIL PROTECTED]>
http://www.firstmonday.dk/issues/issue2_5/rowland/
The TCP/IP protocol suite has a number of weaknesses that allow an attacker
to leverage techniques in the form of covert channels to surreptitiou
http://www.firstmonday.dk/issues/issue2_5/rowland/
The TCP/IP protocol suite has a number of weaknesses that allow an attacker
to leverage techniques in the form of covert channels to surreptitiously
pass data in otherwise benign packets. This paper attempts to illustrate
these weaknesses in both