In both networking and security we are forever opening up TCP/IP packets, inspecting the content, and then taking action. This “action” could be passing the packets to a downstream router, ...