What is the name given to an attack that masks the attackers true source IP address by using an address borrowed from a device on a trusted network?
What is the filename of the file on a SecuRemote client that contains the topology of the site to which the client connects?