Overview
Two perceptions of the event
Effects of the network damage
ISP experiences
TLD DNS vulnerabilities
Closing remarks
Probes by CERT
Previous slide
Next slide
Back to first slide
View graphic version