hey people,

what usually takes place in the application level?

what usually takes place in the underlying IP stack level?

and how come we cant emulate a fake underlying IP stack level to other people (hackers)using the nmap tool


thanks alot for your help