spoofing

listen to the pronunciation of spoofing
Английский Язык - Турецкий язык
Английский Язык - Английский Язык
The action of the verb to spoof
Present participle of spoof
Phishing
A method of attacking a computer program, in which the program is modified so as to appear to be working normally when in reality it has been modified with the purpose to circumvent security mechanisms
is when an e-mail message appears to come from a legitimate source but in fact is from an impostor E-mail spoofing can be used for malicious purposes such as trawling for sensitive business data and other industrial espionage activities
A Web site posing as another site to gather confidential or sensitive information, alter data transactions, or present false or misleading data
Impersonating the identity of an individual (such as a storage administrator) or of a device (such as a storage switch) to gain unauthorized access to a storage resource
Impersonating another user to gain e-mail access
Pretending to be somebody else Example: a login screen, an IP address, a terminal, a NIS reply, etc
Pretending to be someone else The deliberate inducement of a user or a resource to take an incorrect action Attempt to gain access to an AIS by pretending to be an authorized user Impersonating, masquerading, and mimicking are forms of spoofing
Illegitimate sites that appear to be published by established organizations Con artists have illegally obtained credit card numbers by setting up professional-looking storefronts that mimic legitimate businesses
Faking the origin; for example, forging mail headers to make it appear that messages originated elsewhere One spoof incident reported by CERT involved messages sent to users, supposedly from local system administrators, requesting them to change their password to the new value provided in the message These messages were not from the administrators, but from intruders trying to steal accounts Web spoofing Academics at Princeton university published a paper describing how easy it is for Web spoofers to produce a 'fake' site that can sit between the user and his or her intended destination Ths spoofers could receive messages and then pass them on to the true destination, and could receive replies and pass them back to the user In this way it would be possible to 'filter' valuable information, possibly without the parties concerned ever knowing that it had occurred
– extremely fast dial up routines used to simulate a constantly open connection on a circuit switched network The speed of establishing the connection makes it appear that the connection was never interrupted
Many network and server operating systems send "keepalive" packets to check the state of connected clients, to ensure that they really are still connected During periods of inactivity this can result in unnecessary calls being made For this reason, ISDN routers are normally configured to spoof these connections, and reply to keepalive packets on behalf of the remote client
Assuming the identity of another as in sending email under someone else's name
Spoofing is the process of replicating the global navigation satellite code in such a way that a receiver calculatesan incorrect position solution
To fool In networking, the term is used to describe a variety of ways in which hardware and software can be fooled IP spoofing, for example, involves trickery that makes a message appear as if it came from an authorized IP address
The deliberate transmission of fake signals to fool a GPS receiver Spoofer must mimic a GPS satellite, rather like a psuedolite but with disruptive intent
A scam used to steal passwords from legitimate accounts by using phony login screens
Impersonating a server or person without permission Pretending to be someone else The deliberate inducement of a user or a resource to take an incorrect action Attempt to gain access to a system by pretending to be an authorized user Impersonating, masquerading, and mimicking are forms of spoofing
The process of replicating the GPS code so that the user computes incorrect position solutions
An attempt to gain access to a networked device by posing as an authorized user, device, or program
When a device, such as a load balancer, answers a request in the name of another device, such as a web server in a farm located behind it
A method of fooling network end stations into believing that keep-alive signals have come from and return to the host Polls are received and returned locally at either end of the network and are transmitted only over the open network if there is a condition change The result is a non-time critical network with a minimum of keep-alive traffic between deterministic end stations, while retaining the opportunity to send flags should an end station alter its state The synchronous approach harks back to unreliable circuits and the need to check end station existence at regular intervals Now networks are more reliable, spoofing by routers is an acceptable compromise
A ploy designed to deceive the observer into believing that an operation has gone bad when, in fact, it has been put into another compartment
the process of disguising one computer user as another
A form of masquerading where a trusted IP address is used instead of the true IP address as a means of gaining access to a computer system
An attempt to gain access to a system by posing as an authorized user
Pretending to be someone or something else (e g using someone else's password)
spoof
to gently satirize
spoof
a light parody
spoof
to deceive
spoof
A drinking game in which players hold up to three (or another specified number of) coins hidden in a fist and attempt to guess the total number of coins held
spoof
to ejaculate, to come
spoof
nonsense
spoof
1) To deceive for the purpose of gaining access to someone else's resources (for example, to fake an Internet address so that one looks like a certain kind of Internet user or server)2) To simulate a communications protocol by a program that is interjected into a normal sequence of processes for the purpose of adding some useful function
Web spoofing
faking an Internet address in order to assume a user's identity and get access to other users' data; satirical description of a web site
spoof
a composition that imitates somebody's style in a humorous way
spoof
make a parody of; "The students spoofed the teachers"
spoof
a hoax
spoof
make a parody of; "The students spoofed the teachers
spoof
To counterfeit a software program in order to get access or information on a system illegally
spoof
semen
spoof
{i} parody, mocking imitation; hoax, swindle
spoof
In e-mail, to fake the "From: " address so that a message appears to be from someone other than the actual sender  
spoof
A method of communication which does not prepend the name of the speaker Spoofing can be used to enhance the realism and interest of a conversation or scene, but using the spoof command to impersonate another character's speech or action is strictly forbidden See the MOOing 101 tutorial for more information
spoof
A spoof is something such as an article or television programme that seems to be about a serious matter but is actually a joke. a spoof on Hollywood life. a funny book, play, or film that copies something serious or important and makes it seem silly take-off spoof of/on (Invented name for a game involving deception)
spoof
{f} parody, mockingly imitate; fool, deceive
spoof
to falsify
spoofing

    Турецкое произношение

    spufîng

    Произношение

    /ˈspo͞ofəɴɢ/ /ˈspuːfɪŋ/
Избранное