Hi,

On Tue, Jul 17, 2012 at 11:03 PM, Scott Best <[email protected]> wrote:

>
>
> > I'm out of my depth here, but I don't see why its so difficult to defend
> against denial of service attacks.  You listen for certain things on
> certain ports, each has an appropriate sized buffer and when that's full
> you block the port. Can't a simple buffer full, block port routine be run
> at a level that is secure from Trojans?
>
> Along these same lines, I was wondering if a "proof of work" element to a
> search request might also help against the ten billion problem.


What is this "ten billion problem" ?

best,
valerio
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to