pansophic, you wrote:
Depending on the protocols (and applicaitons) that are used, it may be possible to "fingerprint" the user's machine and block based on a fingerprint. With web browsers you can grab all kinds of potentially unique information from the browser to identify a...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.