Which tool/utility can help you extract the application layer data from each TCP connection from a log file into separate files?
Which of the following is NOT a means that can be used to minimize or protect against such an attack?