Overview

IP spoofing


Show Summary Details

Quick Reference

Some networked systems allow access only to hosts which have a particular Internet Protocol Address. IP spoofing involves an unauthorized entry into one of these systems. It is carried out by modifying packets of data that are sent to a network so that they look as if they have originated from a computer whose address indicates that it is allowed access into the network.

Subjects: Computing.


Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.