The IP Protocol injected, inspected, detected, infected - Part II
On the previous chapter of "IP injected, inspected, detected, infected" -
- "Programmers that deal with networks and TCP/IP, sometimes want or need
to do the following nasty things to or with the protocol..."
- "Inspecting IP packets flowing through the network..."
- "Detecting IP packets, doing some automatic analysis to the packets..."
Today we will look at the other part - injecting new IP packets, and infecting
existing IP packets.
Originally written by