Protocol Selection Criteria

By Tom Markham

Dr. Dobb's Journal June 1997

Figure 3: Example network showing the potential for spoofing source addresses.

Back to Article


Copyright © 1997, Dr. Dobb's Journal