well..this s my work so far..i have learnt abt the attack and how it
works..my project aim is to identify the DDos attack source using traceback
technique..i have referred a lot from certain books..like hacking
exposed...hacking the art of exploitation..all i need is the help for
implementation..first i have to try implementing the attack..dont worry..i
have already did setup virtual network for my expriment(VMware)..i need to
knw much deeper abt the attack..and how to implement as well as to
traceback the source..pls help me geeks...

-- 
You received this message because you are subscribed to the Google Groups 
"Google Code Jam" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/google-code?hl=en.

Reply via email to