2013年12月24日星期二

What is IP Spoofing, how does it work ?

IP spoofing is the most exciting topic you will hear these days as it has and very few are able to understand the technical aspect of this. To give you a brief introduction on how this works. IP Spoofing is a trick played on servers to fool the target computer into thinking that it is receiving data from a source other than you. This in turn basically means to send data to a remote host so that it believes that the data is coming from a computer whose IP address is something other than yours. Let's take an example to make it clear:

Let your Computer IP Address be: 205.45.97.02 (REAL IP)
Let the Computer IP Address of the Victim be: 210.15.11.2 (THE VICTIM)
Now let the Computer IP Address of the system you want data to be sent from: 183.23.47.80 (FAKE - SPOOFING) Normally sitting on the computer whose IP is REAL, the datagrams you send to VICTIM will appear to have come from REAL. Now consider a situation where you want to send data packets to VICTIM and make him believe that they came from a computer whose IP is FAKE i.e.183.23.47.80. This is when you perform IP Spoofing.


IP Spoofing thus, can be defined to be the process in which you change or rather spoof your IP Address, so as to fool the target system into believing that your identity is not the one, which is actually yours, but make it believe that you actually are the computer having the spoofed address. Let us take a real life example to understand better. Say there are 3 people, X, Y and Z. You are person Y and you wish to fool person X person over the phone, and make him belive that you are person Z, when actually you are person Y. In order to do so, you might disguise your voice and accent and make it sound real, more like that of person Z, so that person X might get fooled by believing that he is actually communicating with person Y. If you now, replace the three persons in the said example, with a computer and change the term 'voice' to 'IP Address' then you would know what means by IP Spoofing.

So it is always advisable that the user be careful by clicking links on e-mails from un-known or suspicious source, even if you click check for the Internet address, before giving username and password over the internet, on the top of the address bar at Internet explorer or Fire Fox you can see the address of the link, if it is not the one you wanted, don't enter user name or password, for example you wanted www.xyz.com/login page and you are getting www.ac.testloging.com/login than something is wrong someone is trying to spoof you.

Computer industry is going through tremendous pressure these days due to global economic condition, in order to be competitive and have secured networks. Northwest computer offers several technology services for small to large corporation, like IT Consulting, Network Maintenance, Server Maintenance, IT Staffing, etc... In today's industry partnering allows companies to focus on their core competencies without worrying on support services.
Links:
Using CF Card Recovery For Mac is secure and risk-free. The tool does not write anything to or modify the data on the flash card. It retrieves the photos from the card and saves them to a folder on your hard drive. CF Card Recovery For Mac user interface is well designed and users do not require professional skills to use the software.

Mac Data Recovery sports an elegant, efficient interface that may help calm you down when you''re desperate to recover data. Compared to Data Rescue 3, Mac Data Recovery offers a more useful previewer, which made it easier for me to tell in advance whether my files would be recoverable. But in all other ways, Mac Data Recovery offered a comparable feature set and a generally smoother experience.

Fat Loss Factor will help you lose weight in the shortest time. If you want to get a flat belly, just use this video to instruct you how to do. You will never be disappointed. Many customers have tried this tool.

'Cannot find the path specified' Error Accessing Clustered Volume
Information More About Mobile Phone Cases
Publishing Articles - Repair ATI2Dvag DLL Miscalculation - Remove ATI Artwork Error From a PC!
Watch Those Attachments!
Reasons To Acquire Automation Management Membership Software

没有评论:

发表评论