weaknesses in design reuse single connection pipelined actions spoof HELO each time do viruses do this? spoof mail from worms already do this any way around this? not really