Introduction - If you have any usage issues, please Google them yourself
describes how the process of IP addresses hidden. In fact, this is not something I wrote. Which "IP header structure," I am tired of typing, so copying and pasting the Janker article first say thank you! Reference to the code of the foreign proceeding xes write a procedure. So this is just the process of learning a by-product. Since the procedures have been carried out, on the way we work together with Fangshanglai exchanges, enhance it. This paper is merely to point out the IP data structure and delivery mechanism. If someone turning it into a malicious attacks IP tools at your peril.
Packet : 107215764ycip.rar filelist
ycIP.txt