Senaste svaret:
Citat:
The attack should have been incomplete connections, (connections would not have fully established). The attack was probably detected by using the command-line options given to you earlier (in real-time)
So there are no logs corresponding to it and since the request was not complete, it would not have been shown in bandwidth graphs.
|
Helt enkelt så finns inga spår efter attacken mer än ett par timmars nertid och en jäkla massa jobb...