Figure 8.16  Spoofing attack against Unix trust relationships