![]() |
Hashed information is extremely complex, which makes it difficult for a hacker to decipher it. To gain access to a workstation or the information contained within, a hacker needs the IP address, port number, TCP flag, and TCP sequence number. To add to this difficulty, the TCP sequence numbers are randomly used and are terminated after the connection is broken. Each time a new session begins from a particular workstation, a new random TCP sequence number is used. |