Spoofing: An Overview of Some the Current Spoofing Threats

Spoofing can take on many forms in the computer world, all of which involve some type fraudulent representation of information. There are a variety of methods and types of spoofing. I would like to introduce and explain four in this paper: IP, ARP, Web, and DNS. There are no legal or constructive...
By Neil Riser
July 1, 2001

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg