QUOTE (Bearclaw @ Jul 8 2013, 11:55 AM)

Yea. Spoofing is your comlink saying that it is the one with that IP address or that MAC, or in SR4 the "access ID", and it's commands should be followed. The computer version of copying some one's voice.
This really bugs me. Its more than just the IP, more than the MAC, it is also the kerberos ticket and the SSL key pair and everything from identification to authorization when spoofing a command works.
QUOTE (Bearclaw @ Jul 8 2013, 11:55 AM)

The thing is, since the 70's, you could slave devices using telnet, across the world and into space. Slaving isn't new, and it works from the Earth to Mars. Once you make your connection and authenticate, you are in charge of the machine. You need to be in communication range, obviously, but it doesn't matter how many times you go through routers or bounce off satellites to achieve that communication, it still works fine. Just your response slows down. Cause it takes a while for your commands to get to Mars, and it takes a while to get feedback on how well those commands worked.
However, if you block ALL connections except the master, that includes any possible dynamic routers. I hate that you conveniently omit that part of the quote.
I once had a contractor who would throw technobabble at me in an attempt to build credibility. The misapplication of things like equating telneting (or even cascading telnet connections) as slaving reminds me of those days.