Spoofing Attack

In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.

Read more about Spoofing Attack:  Spoofing and TCP/IP, Referrer Spoofing, Poisoning of File-sharing Networks, Caller ID Spoofing, Voice Mail Spoofing and How To Protect Yourself From Unauthorized Access, E-mail Address Spoofing, GPS Spoofing

Famous quotes containing the word attack:

    Philosophy can be compared to some powders that are so corrosive that, after they have eaten away the infected flesh of a wound, they then devour the living flesh, rot the bones, and penetrate to the very marrow. Philosophy at first refutes errors. But if it is not stopped at this point, it goes on to attack truths. And when it is left on its own, it goes so far that it no longer knows where it is and can find no stopping place.
    Pierre Bayle (1647–1706)