?He brings up his Task Manager and sees the following programs running (see screenshot):What has William just installed?
Which of the following tools allows an attacker to intentionally craft packets to confuse pattern-matching NIDS systems, while still being correctly assembled by the host TCP/IP stack to render the attack payload?