Talk:Spoofing attack
Appearance
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
spoof is not clear to me . even synonyms are not clear and uncommon words. pl clarify in simpler words.
Spoofing is where the remote user mimic another user in a way to imitate them for social engineering. They may impersonate their texts, emails, IP, ect l2spoof. sasquatch lovers
Spoofing of File-Sharing Networks
[edit]It says "...the RIAA started to spoof file sharing networks last summer..." When was last summer ? Purplegarlic (talk) 20:38, 26 June 2008 (UTC) spoofing is an intrusion into someothers computer or network disguising as somebody related to it —Preceding unsigned comment added by 59.90.27.11 (talk) 05:10, 24 July 2009 (UTC)
Categories:
- C-Class Computing articles
- Mid-importance Computing articles
- C-Class Computer networking articles
- Mid-importance Computer networking articles
- C-Class Computer networking articles of Mid-importance
- All Computer networking articles
- C-Class Computer Security articles
- High-importance Computer Security articles
- C-Class Computer Security articles of High-importance
- All Computer Security articles
- All Computing articles
- C-Class aviation articles
- WikiProject Aviation articles
- Start-Class military history articles
- Start-Class military science, technology, and theory articles
- Military science, technology, and theory task force articles