scriptjunkie recently had a post on Direct shellcode execution in MS Office macros I didnt see it go into the metasploit trunk, but its there. How to generate macro code is in the post but i'll repost it here so i dont have to go looking for it elsewhere later. He even has a sample to start with so you can see how it works. Just enable the Developer tab, then hit up the Visual Basic button to change code around.
Anonymous systems are used to allow users to surf the web and communicate with servers anonymously.
Some of the popular anonymity service providers are TOR, GTunnel, etc. The main reason for using and anonymous system is most often to hide the identity of the user.
However it is important that the efficiency of the anonymous system is not decreased in the process of providing this service and which depends on numerous factors like latency, the degree of anonymity, etc.
The communication between the sender and the receiver happens through a set of routers, often referred to as a mix or node, whose job is to hide the relationship between the incoming and outgoing packets. It does this by using various techniques i.e., using encryption, adding delays, adding cover traffic, etc.