HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.8 Manipulation of lines

T 5.8 Manipulation of lines

Apart from the interception of lines (cf. T 5.7 Interception of lines), manipulation of lines may have other objectives as well:

.
© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
 
home