(no title)
bgc | 2 years ago
I remember I would take the IP addresses of the “attackers” and plug them into a McAfee graphical tracert tool, and it felt like nothing short of something out of GoldenEye.
Thanks for the memories!
bgc | 2 years ago
I remember I would take the IP addresses of the “attackers” and plug them into a McAfee graphical tracert tool, and it felt like nothing short of something out of GoldenEye.
Thanks for the memories!
No comments yet.