For example, an IDS may possibly be expecting to detect a trojan on port 12345. If an attacker experienced reconfigured it to implement another port, the IDS is probably not able to detect the existence of the trojan. Somehow, he can make his way again to the principle corridor as https://ids06306.blogtov.com/14126289/indicators-on-388-you-should-know