Sunday, October 7, 2007
Active Attack
Active attacks involve some modification of data stream or the creation of false stream and can be sub divided in to four category:
Share It:
Subscribe to Posts [Atom]