"...The tactic exploits the internet routing protocol BGP (Border
Gateway Protocol) to let an attacker surreptitiously monitor
unencrypted internet traffic anywhere in the world, and even modify it
before it reaches its destination...."

http://blog.wired.com/27bstroke6/2008/08/revealed-the-in.html

-- 
Giancarlo Rubio
-------------------------
Histórico: http://www.fug.com.br/historico/html/freebsd/
Sair da lista: https://www.fug.com.br/mailman/listinfo/freebsd

Responder a