sed the
session) and this RST would have the correct sequence number so the
connection would get reset from both partners' points of view?
Regardless of hackers, we're trying to figure out how to legitimately RST
despite possibly not having the exact right sequence value.
Thanks,
Prisc
ybe I would have gotten more responses if I hadn't admitted this was for
my students. :-) I wear many hats and do work as a network operator too
(but for a small network).
Cheers,
Priscilla Oppenheimer
At 09:14 AM 4/27/04, Iljitsch van Beijnum wrote:
On 27-apr-04, at 5:03, Priscilla Oppenhe
, including the use of server-based authentication).
__
Priscilla Oppenheimer
www.topdownbook.com
"Life's a gift, and then you die."
The hacking problem is multi-faceted, of course, and this is just one facet
of a partial solution, but still, do consider it. Thanks for listening. :-)
Priscilla Oppenheimer
At 04:48 PM 3/11/04, Pendergrass, Greg wrote:
By "The Art of War on the Internet" I didn't mean informat
ore
research-oriented. More on IPJ here:
http://www.cisco.com/warp/public/759/
I'd be interesting in hearing what you all think of IPJ.
___
Priscilla Oppenheimer
www.priscilla.com
When your Daemon is in charge, do not try to think consciously. Drift,
wait, and obey. -- Kipling.