and 2 others joined a min ago.
Continue with email
Before we study the vulnerabilities in TCP/IP, we should know a bit about the layers and it's functions.