http://www.firstmonday.dk/issues/issue2_5/rowland/

The TCP/IP protocol suite has a number of weaknesses that allow an attacker
to leverage techniques in the form of covert channels to surreptitiously
pass data in otherwise benign packets. This paper attempts to illustrate
these weaknesses in both theoretical and practical examples.

<snip>
--
_____________________________________________________________________
http://www.unimobile.com/                     http://pobox.com/~udhay
            Unimobile - the world's first internet mobile
                              Now Live !


Reply via email to