HOME

TheInfoList



OR:

Spoof, spoofs, spoofer, or spoofing may refer to: *
Forgery Forgery is a white-collar crime that generally consists of the false making or material alteration of a legal instrument with the specific mens rea, intent to wikt:defraud#English, defraud. Tampering with a certain legal instrument may be fo ...
of goods or documents *
Semen Semen, also known as seminal fluid, is a bodily fluid that contains spermatozoon, spermatozoa which is secreted by the male gonads (sexual glands) and other sexual organs of male or hermaphrodite, hermaphroditic animals. In humans and placen ...
, in Australian slang *
Spoof (game) Spoof is a strategy game, typically played as a gambling game, often in bars and pubs where the loser buys the other participants a round of drinks. The exact origin of the game is unknown, but one scholarly paper addressed it, and more general ...
, a guessing game * Spoofing (finance), a disruptive algorithmic-trading tactic designed to manipulate markets __NOTOC__


Culture

* A type of satire, specifically a
parody A parody is a creative work designed to imitate, comment on, and/or mock its subject by means of satire, satirical or irony, ironic imitation. Often its subject is an Originality, original work or some aspect of it (theme/content, author, style, e ...
, in which an original work is made fun of by creating a similar but altered work. * Spoof film (aka parody film), a cinematographic genre *
Spoofing (anti-piracy measure) Spoof, spoofs, spoofer, or spoofing may refer to: * Forgery of goods or documents * Semen, in Australian slang * Spoof (game), a guessing game * Spoofing (finance), a disruptive algorithmic-trading tactic designed to manipulate markets __NOTOC__ C ...
, a technique to curb unlawful online downloading


Science and technology

* Biometric spoofing, fooling a biometric identification device * DLL spoofing, using an insecure DLL loading routine to load a malicious DLL file


Networking and communications

* Protocol spoofing, a technique to increase performance in data communications *
Spoofing attack In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. Internet Spoofing an ...
, the falsifying of data on a telecommunications network **
ARP spoofing In computer networking, ARP spoofing (also ARP cache poisoning or ARP poison routing) is a technique by which an attacker sends ( spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate ...
**
Caller ID spoofing Caller ID spoofing is a spoofing attack which causes the telephone network's Caller ID to indicate to the receiver of a call that the originator of the call is a station other than the true originating station. This can lead to a display showin ...
**
Email spoofing Email spoofing is the creation of email messages with a forged sender address. The term applies to email purporting to be from an address which is not actually the sender's; mail sent in reply to that address may bounce or be delivered to an unre ...
** IP address spoofing ** MAC spoofing ** Referrer spoofing ** SMS spoofing **
Spoofed URL A spoofed URL involves one website masquerading as another, often leveraging vulnerabilities in web browser technology to facilitate a malicious computer attack. These attacks are particularly effective against computers that lack up-to-date secur ...
**
Website spoofing Website spoofing is the act of creating a website with the intention of misleading readers that the website has been created by a different person or organization. Techniques Normally, the spoof website will adopt the design of the target websit ...


See also

* Meaconing, the interception and rebroadcast of navigation signals * Replay attack, a network attack in which transmitted data is fraudulently repeated or delayed {{Disambiguation