I know something about networking but not enough to be dangerous yet. It
looks like I'm going to have to spend a lot of time figuring out what all
this ipchains coding means. I looked at the rules that were created by
Bastille and it's far more complicated than what I could do manually. It's
a
Sergio Korlowsky wrote:
Internet Protocols (UDP(
connectionless
Short for 'User Datagram Protocol', a connectionless protocol that, like TCP,
runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error
recovery services, offering instead a direct way to send and receive
On Friday 26 October 2001 11:31 pm, you wrote:
udp is what i believe is called a connectionless protocol, data is sent
without regard to whether previous data has been received intact, tcp on
the other hand allows for packets to be re-requested if they are missing or
corrupt, udp is
At 06:37 PM 10/27/2001 -0600, Sergio Korlowsky wrote:
Internet Protocols (UDP(
connectionless
Short for 'User Datagram Protocol', a connectionless protocol that, like TCP,
runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error
recovery services, offering instead a direct
On Saturday 27 October 2001 07:32 pm, you wrote:
At 06:37 PM 10/27/2001 -0600, Sergio Korlowsky wrote:
Internet Protocols (UDP(
connectionless
Short for 'User Datagram Protocol', a connectionless protocol that, like
TCP, runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
I went to sygatetech.com and ran their UDP scan and it shows most ports
closed and a few open ports. Maybe I don't fully understand networking
protocols but isn't UDP a protocol used on LAN's only? If not, how do I put
them into a stealth mode?
udp is what i believe is called a connectionless protocol, data is sent
without regard to whether previous data has been received intact, tcp on the
other hand allows for packets to be re-requested if they are missing or
corrupt, udp is definitely used over the internet
bascule
On Saturday