>>"... by capturing any available waste Internet data during its transit (dropped packets, redundant addresses, undelivered mails etc) and aggregating them in the attack."
>>
>>How in the hell a program can capture waste data "during its transit". A dropped packet is, well, a "dropped packet"!
>
>Don't know about you, but I store the dropped packets in a bucket under my desk and then recycle them. :)
What do you do with it?
I dont see any use for a bucked full of old packets :-)
If we exchange an apple, we both get an apple.
But if we exchange an idea, we both get 2 ideas, cool...Gérald Santerre
Independant programmer - internet or intranet stuff - always looking for contracts big or small :)
http://www.siteintranet.qc.ca