 |
 |
 |
 |
 |
 |
 |
 |
| • |
lots
of non-RFC compliant implementations of
|
|
|
|
everything
(by major vendors)
|
|
|
| • |
bugs
in common OSes, libraries, applications
|
|
|
| • |
misconfigurations
can have huge effects
|
|
|
| • |
attacks
and probes generate strange traffic
|
|
|
| • |
the
Internet is where the impossible is possible,
|
|
|
continuously
|
|