j
k
j a
j l
...Application layer DDoS attacks , in most (all?) cases require a valid TCP/IP connection DNS query-floods are a notable exception.
Application layer DDoS attacks , in most (all?) cases require a valid TCP/IP connection DNS query-floods are a notable exception.
may i remind you of the dns query flood i had which you helped research? udp and tcp, from the same sources. randy
Back to the thread
Back to the list