Quote:
Originally posted by BryanD
Just a bit of news here - do you know HOW they "go after the big fish?". They either get a zillion "drones" (otherwise known as unsuspecting desktops) to participate in one of the many types of concerted attack known as "Distributed Denial of Service" OR they can use your little fish system as one of a series of machines they use to acces and attack OTHER machines - hoping to direct attention to YOU in case someone gets on to them.
|
Interesting, so LITTLE fish need BIG guns after all.