In general, it is best to assume that the network is filled with malevolent entities that will send in packets designed to have the worst possible effect.
In general, it is best to assume that the network is filled with malevolent entities that will send in packets designed to have the worst possible effect.