The Unintentional Criminal: DDoS from the inside!

The criminals will most likely be using a compromised machine as an operations base from which they may launch a computer attack. This paper will highlight the IT Security problems resulting from the economic constraints on an ISP in a developing country and of their impact everywhere. I will use...
By Miguel Dilaj
January 11, 2004

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg