Level Extreme platform
Subscription
Corporate profile
Products & Services
Support
Legal
Français
Free software gives hackers taste of own medicine
Message
General information
Forum:
Windows
Category:
Computing in general
Miscellaneous
Thread ID:
00772421
Message ID:
00772635
Views:
6
>>>>"... by capturing any available waste Internet data during its transit (dropped packets, redundant addresses, undelivered mails etc) and aggregating them in the attack."
>>>>
>>>>How in the hell a program can capture waste data "during its transit". A dropped packet is, well, a "dropped packet"!
>>>
>>>Don't know about you, but I store the dropped packets in a bucket under my desk and then recycle them. :)
>>
>>
>>What do you do with it?
>>I dont see any use for a bucked full of old packets :-)
>
>I use it to test ISNULL() function. :)))

I have tested your reply with this function and the result is .T. :))))
<g>
If we exchange an apple, we both get an apple.
But if we exchange an idea, we both get 2 ideas, cool...


Gérald Santerre
Independant programmer - internet or intranet stuff - always looking for contracts big or small :)
http://www.siteintranet.qc.ca
Previous
Next
Reply
Map
View

Click here to load this message in the networking platform