2 replies [Last post]
Joined: 2009/12/28

I may be dating myself here, but I'm familiar with the term beaconing from back in the token ring days. Not many of you may have actual worked in a token ring environment, but I did for quite some time. Anyhow, my question is this. Does anyone know if beaconing can be used in some shape or form to execute a network hack?
A discussion came up earlier today and the term beaconing was used in relation to network insecurity. I googled it, but couldn't seem to find much info. Any ideas?