Talk:Spoofing attack

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Computer Security / Computing  (Rated Start-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Mid  This article has been rated as Mid-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (marked as Mid-importance).
 
WikiProject Computing / Networking (Rated Start-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Mid  This article has been rated as Mid-importance on the project's importance scale.
Taskforce icon
This article is supported by Networking task force (marked as Mid-importance).
 

spoof is not clear to me . even synonyms are not clear and uncommon words. pl clarify in simpler words.


Spoofing of File-Sharing Networks[edit]

It says "...the RIAA started to spoof file sharing networks last summer..." When was last summer ? Purplegarlic (talk) 20:38, 26 June 2008 (UTC) spoofing is an intrusion into someothers computer or network disguising as somebody related to it —Preceding unsigned comment added by 59.90.27.11 (talk) 05:10, 24 July 2009 (UTC)