I’d be fascinated for both theoretical and practical reasons—I’m a network security guy by day, so I’m frequently looking at incomplete binary data captured between transient ports and wondering what it is.
I’d be fascinated for both theoretical and practical reasons—I’m a network security guy by day, so I’m frequently looking at incomplete binary data captured between transient ports and wondering what it is.