Worth Reading: Honeypot DDoS monitoring The first flaw allows an attacker to spoof requests to a vulnerable service in the name of the victim; the second flaw causes the vulnerable service to answer this request immediately. —Johannes Krupp @APNIC Related ← Worth Reading: Compelling reasons for hybrid cloudWorth Reading: Hedgehogs and Foxes →