Hi There,

> In the mean time, logging traffic to spot odd packets is a great idea.  
> People 
> should document and publish malicious traffic from their networks. 

To be 100 % sure, this has to include a professional pentester who
checks the traffic. Because methods to hide "malicious traffic" inside
the "allowed traffic" do exist.

Gerd


Reply via email to