The document discusses various techniques for computer network attacks, including IP fragmentation attacks, sniffers, session hijacking, and DNS cache poisoning. IP fragmentation can be used to bypass firewalls and intrusion detection systems. Sniffers are tools that capture network traffic, which attackers use to gather passwords and escalate access. Session hijacking allows stealing interactive user sessions. DNS cache poisoning tricks DNS servers into providing incorrect IP addresses to redirect users. Defenses include encryption, authentication, firewalls, and securing DNS servers.