lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.BSI.4.58.0403112335230.8394@dave.horsfall.org> From: dave at horsfall.org (Dave Horsfall) Subject: Caching a sniffer On Thu, 11 Mar 2004, Motiwala, Yusuf wrote: > TDR will not work if someone running Sniffer on existing network port. No, it won't; that's the point. You are supposed to account for all those cables leading out of the patch panel, but given that most humans are generally more than a few inches wide, you look for cable joins instead. -- Dave Horsfall DTM VK2KFU Loyal Unix user since 1975 Booted from Spamtools for dissing the moderator: www.horsfall.org/levine.mail
Powered by blists - more mailing lists