tag:blogger.com,1999:blog-8083286463160428652.post2210061800748374583..comments2024-02-18T20:37:31.515-08:00Comments on Network Security: Advanced Persistent Threat Part IIIRyan M. Ferrishttp://www.blogger.com/profile/03122603266808854365noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-8083286463160428652.post-1547362204909536312010-10-08T01:50:33.431-07:002010-10-08T01:50:33.431-07:00Ryan, I agree that it is possible to examine the o...Ryan, I agree that it is possible to examine the outbound conversations. In most companies that invests in <a href="http://www.workingworld.ca/" rel="nofollow">server support</a>, a thorough inspection of abnormalities in data flows are inspected to fully protect their system. <br /><br />Very informative post. Thanks!Jonathan Mcmurryhttps://www.blogger.com/profile/07455470647244625313noreply@blogger.com