Grice, Corey, How a Basic Attack Crippled Yahoo, at http://news.cnet.com/news/0-1005-202-1544455.ht5ml, 2 pages (last visited Jun. 8, 2000). |
Sandoval, Greg and Troy Wolverton, Leading Web Sites Under Attack, at http://news.cnet.com/news/0-1007-202-1545348.html, 3 pages (last visited Jun. 8, 2000). |
CNET News.com Staff, How a “Denial of Service” Attack Works, at http://news.cnet.com/news/0-1007-202=1546362.html, 1 page (last visited Jun. 8, 2000). |
Jacobus, Patricia, White House Calls Experts to Address Cyber Attacks, at http://news.cnet.com/news/0-1—5-202-1547509.html, 1 page (last visited Jun. 8, 2000). |
The Associated Press, FBI Site Struck by Web Attack, at http://news.cnet.com/news/0-1005-20201558533.html, 1 page (last visited Jun. 8, 2000). |
CERT Advisory, Vulnerabiliyt in Certain TCP/IP Implementations, at ftp://info.cert.org/pub/cert advisories/CA-98-13-tcp-denial-of-service, 4 pages, (last visited Jun. 9, 2000). |
CERT Advisory, TCP SYN Flooding and IP Spoofing Attacks, at ftp://info.cert.org/pub/cert_advisories/CA-96.21.tcp syn flooding, 8 pages (last visited Jun. 9, 2000). |
Internet Server Unavailable Because of Malicious SYN Attacks, at ftp://ftp/microsoft.com/buyssys/win...xes-postSP5/syn-attack/q142641.txt, 5 pages (last visited Jun. 7, 2000). |
Ann Harrison, Firm Nabs Cracker With Intrusion Detection Tool, 33, Computerworld, Aug. 23, 1999, at 59. |
Laura DiDio, Internet Security Holes Widen, 32, Computerworld, Mar. 2, 1998, at 37-39. |
Hackers Used Variety of Tools, Officials Say, KRTBN (Knight-Ridder Tribune Business News), Feb. 11, 2000. |
Axent Increases Flexibility of Security Products, ENT (Boucher Communications), Feb. 9, 2000, at 5, 2, 35. |