would designating three specific event timeslots (in anticipation of high-volume logins) make it easier to intercept network traffic if a hacker knew what they were looking for in advance? in particular a password...? hopefully i asked that in a comprehensible way.
I wouldn't think so, I don't work at Red Fox but I can imagine they have enough resources to handle the traffic workload of events like that, and if they didn't i'm sure they wouldn't do something like that.