This article was first published on NetNod’s Blog. It is reposted here with permission of the author. A lot of the Internet’s most important security tools are dependent on accurate…

This article was first published on NetNod’s Blog. It is reposted here with permission of the author. A lot of the Internet’s most important security tools are dependent on accurate…