tag:blogger.com,1999:blog-4088979.post2501119449673986425..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Black Hat USA 2007 Round-Up Part 2Richard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4088979.post-10690831440123616842007-08-14T22:57:00.000-04:002007-08-14T22:57:00.000-04:00haha you watched Gadi for an hour? i'm surprised y...haha you watched Gadi for an hour? i'm surprised you gave him one minute.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-44841494661046076472007-08-06T04:31:00.000-04:002007-08-06T04:31:00.000-04:00Thanks for the great summary, Richard>>retransmitt...Thanks for the great summary, Richard<BR/><BR/>>>retransmitting a subset of that content in the clear to the management server>><BR/><BR/>Another example is the way various "remote capture probes" work. <BR/><BR/>As you have already stated, just the act of capturing traffic from one segment and playing it back on another is scary.Anonymousnoreply@blogger.com