| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Fidonet and today |
SL> Sure - deep packet inspection is typically a combination of IDS/IPS SL> and a stateful firewall. SL> As for scanning encrypted streams, not sure how exactly that would SL> work without some kind of man in the middle attack. leave out the word "attack" and you have it right... a MitM Attack is one where there is a MitM that is purposely looking at your traffic for the purposes of hijacking data across the encrypted link... there is quite a difference ;) in fact, there are many ISPs who are doing the same thing (using a MitM) specifically for the purposes of protecting their networks and clients/customers :) )\/(ark* Origin: (1:3634/12) SEEN-BY: 3/0 633/267 640/954 712/0 313 550 620 848 @PATH: 3634/12 123/500 261/38 712/848 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.