The behavior of packets and its responses explained last post has been noted by a number of firewall vendors. By understanding such enumerations, the have modified their security system’s for high anonymity by spoofing the source address of the RST/ACK packet to be that of the target host. As such,