At 11:07 PM + 3/10/13, Dmitry Anipko wrote:
In such an attack, is the attacker on the path between the victim
and the server? If yes, there are more efficient ways how they can
DoS the victim. If no, how does the attacker know which of the
billions hosts on the Internet will be talking to
A second thought.
Really all you have to do is grab some cloud resources and you can
blast away at thousands of people starting at hundreds of points in
the identifier space and since you have already hacked the cloud, it
is all free.
(After the RSA breach (I had students involved in the
is that it is possible for not very good programmers
to do dumb things that will work for awhile. As we have seen in this
field since its inception, it is dangerous to confuse economic
success with good science.
Well, it works! is merely an excuse, not an argument for good science.
Take care,
John
Odd you should mention the speeding ticket.
Cop pulled Rich over just after they entered OK on the way down.
Sauntered up to the car and said, Do you know how fast you were
going? Rich said, yes. Officer says, 86. Rich says, The heck I
was. The cruise control was set on 75 (in a 75 mph
At 17:21 -0700 2007/09/17, Fred Baker wrote:
I'm not quite sure what point you're making.
If it's the size of the network part or the host part of an IPv6
address, as I recall the logic, the original stated requirement was
that an ipng address should be able to represent 10^12 networks (42
Geographical is a possible topology according to all of my topology
books. As every map projection illustrates by constructing a topology
between the map and the physical world. Whether that topology and a
particular graph have a topological relation is a different matter.
A network in and of