This paper describes a new technique for spoofing an IP address with any networking application.