Talk:Spoofing attack
Appearance
	
	
| This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects:  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
 
 
  | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
spoof is not clear to me . even synonyms are not clear and uncommon words. pl clarify in simpler words.
Spoofing is where the remote user mimic another user in a way to imitate them for social engineering. They may impersonate their texts, emails, IP, ect l2spoof. sasquatch lovers
Spoofing of File-Sharing Networks
[edit]It says "...the RIAA started to spoof file sharing networks last summer..." When was last summer ? Purplegarlic (talk) 20:38, 26 June 2008 (UTC) spoofing is an intrusion into someothers computer or network disguising as somebody related to it —Preceding unsigned comment added by 59.90.27.11 (talk) 05:10, 24 July 2009 (UTC)
Categories: 
- C-Class Computing articles
 - Mid-importance Computing articles
 - C-Class Computer networking articles
 - Mid-importance Computer networking articles
 - C-Class Computer networking articles of Mid-importance
 - All Computer networking articles
 - C-Class Computer security articles
 - High-importance Computer security articles
 - C-Class Computer security articles of High-importance
 - All Computer security articles
 - All Computing articles
 - C-Class aviation articles
 - WikiProject Aviation articles
 - Start-Class military history articles
 - Start-Class military science, technology, and theory articles
 - Military science, technology, and theory task force articles
 




