* * * * * Shhh, don't let them in on it … > From the Internet's perspective, your computer was never on the Internet at > all. If someone traces the connections back, the packets will all look like > they came from the hijacked connection. This is especially useful when > dealing with monitored conversations (see Echelon, Carnivore, the ultra- > secret level-3 DeadMan monitoring stations that pepper the globe like > icepick wounds in Trotsky's skull). > > Note that I'm talking about taking over lower-level connections, *not* > impersonating users to make it look like they sent an email or a Usenet > post. That sort of stuff is relatively trivial. I'm talking about physical > and data-link OSI-level takeover. I was going to use this very technique to > send this post, but it takes finding a physical close computer that is > running Win9x or “Win2K”, and the scanning program to find such a computer > has not been ported to Windows 2000 (which is the program I am using to > compose this article).) > Alien Internet Conspriracy [1] Uh, yea. Right. [1] http://www.hardcorelinux.com/alien.htm Email author at sean@conman.org