This article is within the scope of , a collaborative effort to improve the coverage of WikiProject Computer Security computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start This article has been rated as
Start-Class on the project's quality scale.
Mid This article has been rated as
Mid-importance on the project's importance scale.
This article is supported by
(marked as WikiProject Computing Mid-importance).
Things you can help
WikiProject Computer Security with:
Answer question about
Same-origin_policy Review importance and quality of existing articles
Identify categories related to Computer Security
Tag related articles
Identify articles for creation (see also:
Article requests) Identify articles for improvement
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
Find editors who have shown interest in this subject and ask them to take a look here.
spoof is not clear to me . even synonyms are not clear and uncommon words. pl clarify in simpler words.
Spoofing is where the remote user mimic another user in a way to imitate them for social engineering. They may impersonate their texts, emails, IP, ect l2spoof. sasquatch lovers
Spoofing of File-Sharing Networks [ edit ]
It says "...the RIAA started to spoof file sharing networks last summer..." When was last summer ?
Purplegarlic ( talk) 20:38, 26 June 2008 (UTC) spoofing is an intrusion into someothers computer or network disguising as somebody related to it —Preceding unsigned comment added by 22.214.171.124 ( talk) 05:10, 24 July 2009 (UTC)