1. 4
  1.  

  2. 2

    I think the original paper is worth reading. http://internetcensus2012.bitbucket.org/paper.html

    The vice “easy to understand” explanation was a lot harder to understand. I mean, why would you need to hack into a computer to ping it?