1 00:00:08,910 --> 00:00:14,700 Now, the cost structure, we would go like this, we know we're on Skype. 2 00:00:15,000 --> 00:00:20,780 So actually in this scene when Eliot said that he's talked to intercepting all the traffic in, you 3 00:00:23,460 --> 00:00:27,060 know, in this scene, what we've learned, we will learn. 4 00:00:27,060 --> 00:00:28,290 What is the deal with 5 00:00:34,320 --> 00:00:36,250 this picture will explain. 6 00:00:36,270 --> 00:00:39,120 So you can see that here is the surface, which we have Google. 7 00:00:39,250 --> 00:00:42,000 We would assume that this is the network infrastructure. 8 00:00:42,410 --> 00:00:42,830 Right. 9 00:00:42,930 --> 00:00:44,970 This is the whole infrastructure, 10 00:00:53,260 --> 00:00:55,280 so full of the torture. 11 00:00:55,300 --> 00:01:02,110 But we will have a window 18 and we would install all there and we would run a cement tool with. 12 00:01:04,050 --> 00:01:06,840 Now, for any ID, we would have Cárdenas. 13 00:01:42,170 --> 00:01:48,910 I we've looked at that with one, two or three we will get or we deserve out here and here is the claim, 14 00:01:48,910 --> 00:01:51,700 the being or ICMP flooded, you know. 15 00:01:51,700 --> 00:01:58,240 And so Simplot at that deadly attack is now the first one, which is and here is the I.B. And as you 16 00:01:58,240 --> 00:01:59,950 can see, chanting my name is idea. 17 00:02:00,080 --> 00:02:02,020 You can put the target poster. 18 00:02:02,050 --> 00:02:05,650 And actually it depends on the damage you have. 19 00:02:06,100 --> 00:02:09,670 But now how can I defend against the US or the.