Stealth Scans

Cha Kotay chakotay at myrealbox.com
Sun Mar 25 21:38:06 PST 2001


Understanding stealth scans: Forewarned is forearmed 
Learn the 'secret handshakes' of TCP/IP that crackers 
exploit 
Summary
This week Joe Barr presents the first of two columns about 
stealth scans, and NMAP, a port scanner used by attackers 
and system administrators alike. (1,300 words) 
By Joe Barr 

http://www.linuxworld.com/linuxworld/lw-2001-03/lw-03-
vcontrol_3.html
--
Chakotay

"Some men are born mediocre, some men achieve mediocrity, 
and some men have mediocrity thrust upon them."
Joseph Heller, Catch-22






More information about the cypherpunks-legacy mailing list