an article on spoofing by freefeast

Spoofing is a term used in computer science to address a situation where a person or a program poses as someone else and gains information from the other illegally.

Several kinds of spoofing are:

1) E-mail address spoofing

This is also known as spam mail. The spammers easily pose as someone else in the ‘from’ field in the e-mail and attacks the receiver.

2) Referrer spoofing

Some sites give access to their content from certain approved pages. This occurs by forcing the referrer of the HTTP request. This referrer is spoofed to gain access to confidential information.

3) Caller-ID spoofing

Caller-id’s are been used in our land phones to check the identity of the caller. Nowadays there are technologies available to even enable the callers to lie about their identities and there by can use to for a tool to harass or fraud.

The internet is spread over a wide area and calls are made using VOIP (Voice over internet protocol). VOIP is connected to the public telephone networks  by various services and gateways.Using this we can make calls to any part of the planet by using fake numbers and making the caller id system fake.

4) URL Spoofing

This is also known as phishing or E-mail spoofing. The fraudster creates a legitimate looking website of a bank or any legal entity and phish out confidential details of the users.

5) spoofing  IP address

IP (Internet protocol) is the basic protocol for any two machines on the internet to communicate. The source and the destination headers are used for handing the source and the destination addresses. Spoofing can be done by modifying the source header in such a way that the receiver will feel that the packet was received from a different machine.