Spoof On Titan
   HOME

TheInfoList



OR:

Spoof, spoofs, spoofer, or spoofing may refer to: *
Forgery Forgery is a white-collar crime that generally consists of the false making or material alteration of a legal instrument with the specific mens rea, intent to wikt:defraud#English, defraud. Tampering with a certain legal instrument may be fo ...
of goods or documents *
Semen Semen, also known as seminal fluid, is a bodily fluid that contains spermatozoon, spermatozoa which is secreted by the male gonads (sexual glands) and other sexual organs of male or hermaphrodite, hermaphroditic animals. In humans and placen ...
, in Australian slang *
Spoof (game) Spoof is a strategy game, typically played as a gambling game, often in bars and pubs where the loser buys the other participants a round of drinks. The exact origin of the game is unknown, but one scholarly paper addressed it, and more general ...
, a guessing game *
Spoofing (finance) Spoofing is a disruptive algorithmic trading activity employed by traders to outpace other market participants and to manipulate markets. Spoofers feign interest in trading futures, stocks, and other products in financial markets creating an illu ...
, a disruptive algorithmic-trading tactic designed to manipulate markets __NOTOC__


Culture

* A type of satire, specifically a
parody A parody is a creative work designed to imitate, comment on, and/or mock its subject by means of satire, satirical or irony, ironic imitation. Often its subject is an Originality, original work or some aspect of it (theme/content, author, style, e ...
, in which an original work is made fun of by creating a similar but altered work. * Spoof film (aka parody film), a cinematographic genre *
Spoofing (anti-piracy measure) Spoof, spoofs, spoofer, or spoofing may refer to: * Forgery of goods or documents * Semen, in Australian slang * Spoof (game), a guessing game * Spoofing (finance), a disruptive algorithmic-trading tactic designed to manipulate markets __NOTOC__ C ...
, a technique to curb unlawful online downloading


Science and technology

*
Biometric spoofing A biometric device is a security identification and authentication device. Such devices use automated methods of verifying or recognising the identity of a living person based on a physiological or behavioral characteristic. These characteristic ...
, fooling a biometric identification device *
DLL spoofing A dynamic-link library (DLL) is a shared library in the Microsoft Windows or OS/2 operating system. A DLL can contain executable code (functions), data, and resources. A DLL file often has file extension .dll even though this is not required. ...
, using an insecure DLL loading routine to load a malicious DLL file


Networking and communications

*
Protocol spoofing Protocol spoofing is used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates. Spoofing techniques In most applications of protocol spoofing, a ...
, a technique to increase performance in data communications *
Spoofing attack In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. Internet Spoofing an ...
, the falsifying of data on a telecommunications network **
ARP spoofing In computer networking, ARP spoofing (also ARP cache poisoning or ARP poison routing) is a technique by which an attacker sends ( spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate ...
**
Caller ID spoofing Caller ID spoofing is a spoofing attack which causes the telephone network's Caller ID to indicate to the receiver of a call that the originator of the call is a station other than the true originating station. This can lead to a display showin ...
**
Email spoofing Email spoofing is the creation of email messages with a forged sender address. The term applies to email purporting to be from an address which is not actually the sender's; mail sent in reply to that address may bounce or be delivered to an unre ...
**
IP address spoofing In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address, for the purpose of impersonating another computing system. Background The basic protocol for sending ...
** MAC spoofing **
Referrer spoofing In HTTP networking, typically on the World Wide Web, referer spoofing (based on a canonized misspelling of ''referrer'') sends incorrect referer information in an HTTP request in order to prevent a website from obtaining accurate data on the i ...
** SMS spoofing **
Spoofed URL A spoofed URL involves one website masquerading as another, often leveraging vulnerabilities in web browser technology to facilitate a malicious computer attack. These attacks are particularly effective against computers that lack up-to-date secur ...
**
Website spoofing Website spoofing is the act of creating a website with the intention of misleading readers that the website has been created by a different person or organization. Techniques Normally, the spoof website will adopt the design of the target websit ...


See also

*
Meaconing Meaconing is the interception and rebroadcast of navigation signals. These signals are rebroadcast on the received frequency, typically with power higher than the original signal, to confuse enemy navigation. Consequently, aircraft or ground stati ...
, the interception and rebroadcast of navigation signals *
Replay attack A replay attack (also known as a repeat attack or playback attack) is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary w ...
, a network attack in which transmitted data is fraudulently repeated or delayed {{Disambiguation