I'm just assessing the security of my home server in preparation for opening it up to the internet. I've used nmap from a machine on my local network but I have firewall rules allowing access from the local network so this reveals more than I think will be visible from the internet.
Is there any way to 'spoof' the address nmap is scanning from, so I can see what a potential attacker would see? Any google search for that kind of thing yields a lot of very shady looking websites...