How does NT deal with fragmented IP packets?
Prior to NT4 SP3, not too good. Due to a bug in Microsofts IP implementation, one can fool the stack to reassemble fragmented packets in such ways that it is possible to send arbitrary data to an arbitrary port even when the target machine is protected by a firewall. There are firewalls that prevent this by handling all reassembling before forwarding the complete packet to the target host. It is probably wise to check up your firewall and/or apply SP3 if not done already. Visit Thomas Lopatic’s
*Sadly, we had to bring back ads too. Hopefully more targeted.