I will have to disagree with that last statement.
You could use IP spoofing if there is a trust relationship between two computer based on IP autentication. It is hard to do and you have to be a...