Ping commands are very useful, but would-be attackers often use them to identify systems. To prevent that, we show you how to get your system to ignore these requests. The ping command sends one or ...