The IP Protocol injected, inspected, detected, infected - Part I

Programmers that deal with networks and TCP/IP, sometimes want or need to do the following nasty things to or with the protocol:

Today we will look at several tools that may be used to do the above, On a Linux system. Some of these tools are available on other platforms - some not.

Note: we will not cover the topics in the order stated above - it was there just because of a song...

Originally written by Valid HTML 4.01!guy keren