Computer’s validity is set by network or operating system through the rules IP protocols. In some instance, IP address is forged by attacker, namely, forged ID. Attacker may use special program to manufacture IP packet, make the packet seemingly from valid address inside the web. After acquiring access authorization by valid IP address, attacker can modify, reroute, and delete data. Attack exists everywhere.