in a nutshell, this step is just part of exploit
ing a trust relationship
between two box
en (aka computer
s) that are on the net or simply communicating via a tcp
based connection. what it does is fake out the other boxes on the network
so they think that you're someone you're not.
i would go into further detail on this, but i'd take up too much space and probably get yelled at.
so if ya wanna find out more about it, you can go here: http
you can also check out the spoofing
ps. don't go and do something stupid. the purpose of these magazines are too inform you what can be done, so you can protect against it. in short, if you go and hack someones network, and end up branded, shot, arrested, court-martialed, drawn and quartered, drawn and halved, or run off by wild horse then it's not my fault. other than that, have fun!!
pps. it's highly unlikely that this will be accomplished from a box running windows, period.