In make our systems more secure from being rooted, it know that an attacker can get through a firewall using a "spoofed packet". I'm using IPtables. Does anybody have any information how the packet is spoofed, what to look for, and way to enhance a firewall against this. Thanks in advance. Pete