You have lots of mistakes in the article, and really not enough details of what is the attack and how it happens. Like how can you know who is the attacker and how do you DDoS them
You are viewing a single comment's thread from:
You have lots of mistakes in the article, and really not enough details of what is the attack and how it happens. Like how can you know who is the attacker and how do you DDoS them