A while ago, I read and tried to implement the ideas provided in the article (the attachment in this post), I was amazed. The results were so shocking, specifically when it comes to security risks with our networks. There are numerous security loop holes that the article reveals, though some modifications have been made to remedy them by network owners, such that some of its examples are no longer available on line. I do not like to bore you with so many words, just download the damn article, read it thoroughly and get the content. Disclaimer! The attachment is not mine, it is meant for educational purposes only. Any unlawful use of its contents are at your responsibility.