This effectively transfers all the output from the sourcecomputer to the destination computer.
这样可以有效地将所有的输出从源计算机传输到目标计算机。
2
It then replaces the IP address with its own registered IP address and the port number corresponding to the location of the entry for that packet's sourcecomputer in the table.
Once the attack begins, websites can try to trace the sudden flood of traffic back to the sourcecomputer and filter it out, but even that's a complex process.