In This Chapter
In this chapter you learn about spoofing attacks—how they are performed and how you can prevent them.
The secret to creativity is knowing how to hide your sources.
Spoofing can be summed up in a single sentence: It's a sophisticated technique of authenticating one machine to another by forging packets from a trusted source address.
From that definition, you can safely conclude that spoofing is a complicated process. However, by this chapter's end, you'll have a clear understanding ...