We recently wrote about the diminishing usability of “ping” and “tracert” due to the use of these commands as components of various types of network attacks. We also expressed our dismay that by ...