26 Mar
2001
26 Mar
'01
1:27 a.m.
Understanding stealth scans: Forewarned is forearmed Learn the 'secret handshakes' of TCP/IP that crackers exploit Summary This week Joe Barr presents the first of two columns about stealth scans, and NMAP, a port scanner used by attackers and system administrators alike. (1,300 words) By Joe Barr http://www.linuxworld.com/linuxworld/lw-2001-03/lw-03- vcontrol_3.html -- Chakotay "Some men are born mediocre, some men achieve mediocrity, and some men have mediocrity thrust upon them." Joseph Heller, Catch-22