*Note: this article was originally published on Security Focus, 16-Jan-2002. I have updated it in places to be more relevant to the current world constraints.
Like a raging cancerous growth the Internet has evolved and expanded in a rapid, unplanned and chaotic manner. Initially, little consideration was given to network