Findings:
- Attacker
- Detecting an attacker's IP address hidden by backscatter
- If an attacker has physical access, your system is already compromised
- Confront
- What would happen if an immovable object were confronted with an unstoppable force?
- Confront your fear
- Confront the spectacle with its own irrelevance
- There are words. When new ideas confront us, we create new words. We forget that there are no words.
If you Log in you could create a "confront the attacker" node. If you don't already have an account, you can register here.