4ac37f9600
to elude most network intrusion detection systems. The attacks implemented correspond to those listed in the Secure Networks ``Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection'' paper of January, 1998.
1 line
21 B
Text
1 line
21 B
Text
NetBSD 2.0 untested.
|