View Single Post
  #10  
Old 10-16-2015, 11:10 AM
simp403 simp403 is offline
Kobold

simp403's Avatar

Join Date: Jul 2015
Posts: 100
Default

Quote:
Originally Posted by Spyder73 [You must be logged in to view images. Log in or Register.]
We had our first breakthrough in September when a subnet archive deactivated a VIN adapter and the attacker(s) QRN become vulnerable to IQN pings.
So I suspect that an IQN ping involves getting iSCSI information from the host, but I don't know what a QRN is or a VIN adapter. Can you please explain this entire statement? I'm relatively knew to network engineering and I'd really like to know what this whole process is, unless it's bullshit, in which case I commend you on writing up nonsense that can fool a recent Comp Sci undergrad.
__________________
Dinobots