Such as, an IDS may expect to detect a trojan on port 12345. If an attacker had reconfigured it to work with a unique port, the IDS will not be in the position to detect the existence of your trojan. Compatibility ensures that facts within the program can be correlated https://38829518.wikirecognition.com/1338198/the_5_second_trick_for_388