Level Extreme platform
Subscription
Corporate profile
Products & Services
Support
Legal
Français
Free software gives hackers taste of own medicine
Message
General information
Forum:
Windows
Category:
Computing in general
Miscellaneous
Thread ID:
00772421
Message ID:
00772640
Views:
9
>>>>>"... by capturing any available waste Internet data during its transit (dropped packets, redundant addresses, undelivered mails etc) and aggregating them in the attack."
>>>>>
>>>>>How in the hell a program can capture waste data "during its transit". A dropped packet is, well, a "dropped packet"!
>>>>
>>>>Don't know about you, but I store the dropped packets in a bucket under my desk and then recycle them. :)
>>>
>>>
>>>What do you do with it?
>>>I dont see any use for a bucked full of old packets :-)
>>
>>I use it to test ISNULL() function. :)))
>
>I have tested your reply with this function and the result is .T. :))))
><g>

Told ya... :)))
Nick Neklioudov
Universal Thread Consultant
3 times Microsoft MVP - Visual FoxPro

"I have not failed. I've just found 10,000 ways that don't work." - Thomas Edison
Previous
Reply
Map
View

Click here to load this message in the networking platform