Say I have static IP.
Other machine I connect to can retrieve it (unless I'm hiding it).
But ... can someone mimick my static IP and successfully pose as me presenting somehow my IP to target comp?
Say I have static IP.
Other machine I connect to can retrieve it (unless I'm hiding it).
But ... can someone mimick my static IP and successfully pose as me presenting somehow my IP to target comp?