And Finally

 

A common mistake that people make when trying to design something completely foolproof is to underestimate the ingenuity of complete fools.

 Douglas Adams, Mostly Harmless

links

http://citeseer.nj.nec.com/context/29483/0 - ICMP packets returned during router queue overload.... command 4.

http://www.phrack.com/show.php?p=58&=5 - Armouring the ELF: Binary encryption on the UNIX platform

http://www.acm.uiuc.edu/sigmil/RevEng/t1.htm - Introduction to Reverse Engineering Software in Linux

www.zeltser.com/sans/gcih-practical/revmalw.html - Reverse Engineering Malware by lenny zeltser

http://staff.washington.edu/dittrich/misc/mstream.analysis.txt -mstream analysis for comparisons

http://www.sans.org/dosstep/ - Steps to prevent DoS

http://www.ddosworld.com/ - ddos world (information etc)

http://razor.bindview.com/tools/fenris/ - *cough* fenris *cough*

http://www.backerstreet.com/rec/rec.htm - REC (Reverse Engineering Compiler)

http://www.kde.org/bulletin/kdelibs-kdebug-13Sep1997.html - kDebug

http://biew.sourceforge.net/ - Biew (Binary VIEW)

Plus the stanndard linux tools: strace, strings, objdump