Stealth Scans
Cha Kotay
chakotay at myrealbox.com
Sun Mar 25 21:38:06 PST 2001
Understanding stealth scans: Forewarned is forearmed
Learn the 'secret handshakes' of TCP/IP that crackers
exploit
Summary
This week Joe Barr presents the first of two columns about
stealth scans, and NMAP, a port scanner used by attackers
and system administrators alike. (1,300 words)
By Joe Barr
http://www.linuxworld.com/linuxworld/lw-2001-03/lw-03-
vcontrol_3.html
--
Chakotay
"Some men are born mediocre, some men achieve mediocrity,
and some men have mediocrity thrust upon them."
Joseph Heller, Catch-22
More information about the cypherpunks-legacy
mailing list