Aug 11, 2009, 02:03 PM
bobbobagan Wrote:We may try doing what we done last time. Turning off the server, leaving only the attacking traffic coming through and then doing a packet capture.
This is a good idea. If you do it, let me know what you find. Maybe send me the capture file.