In both networking and security we are forever opening up TCP/IP packets, inspecting the content, and then taking action. This ?action? could be passing the packets to a downstream router, prioritizing delivery, or preventing the spread of malicious code.
Link: news.com
Category:
- Networking