ALL >> Computers >> View Article
What Is Ip Spoofing, How Does It Work ?
IP spoofing is the most exciting topic you will hear these days as it has and very few are able to understand the technical aspect of this. To give you a brief introduction on how this works. IP Spoofing is a trick played on servers to fool the target computer into thinking that it is receiving data from a source other than you. This in turn basically means to send data to a remote host so that it believes that the data is coming from a computer whose IP address is something other than yours. Let's take an example to make it clear:
Let your Computer IP Address be: 205.45.97.02 (REAL IP)
Let the Computer IP Address of the Victim be: 210.15.11.2 (THE VICTIM)
Now let the Computer IP Address of the system you want data to be sent from: 183.23.47.80 (FAKE - SPOOFING) Normally sitting on the computer whose IP is REAL, the datagrams you send to VICTIM will appear to have come from REAL. Now consider a situation where you want to send data packets to VICTIM and make him believe that they came from a computer whose IP is FAKE i.e.183.23.47.80. This is when you perform IP Spoofing.
IP Spoofing thus, can ...
... be defined to be the process in which you change or rather spoof your IP Address, so as to fool the target system into believing that your identity is not the one, which is actually yours, but make it believe that you actually are the computer having the spoofed address. Let us take a real life example to understand better. Say there are 3 people, X, Y and Z. You are person Y and you wish to fool person X person over the phone, and make him belive that you are person Z, when actually you are person Y. In order to do so, you might disguise your voice and accent and make it sound real, more like that of person Z, so that person X might get fooled by believing that he is actually communicating with person Y. If you now, replace the three persons in the said example, with a computer and change the term ‘voice' to ‘IP Address' then you would know what means by IP Spoofing.
So it is always advisable that the user be careful by clicking links on e-mails from un-known or suspicious source, even if you click check for the Internet address, before giving username and password over the internet, on the top of the address bar at Internet explorer or Fire Fox you can see the address of the link, if it is not the one you wanted, don't enter user name or password, for example you wanted www.xyz.com/login page and you are getting www.ac.testloging.com/login than something is wrong someone is trying to spoof you.
Computer industry is going through tremendous pressure these days due to global economic condition, in order to be competitive and have secured networks. Northwest computer offers several technology services for small to large corporation, like IT Consulting, Network Maintenance, Server Maintenance, IT Staffing, etc In today's industry partnering allows companies to focus on their core competencies without worrying on support services. You can contact us at http://www.nwcsupport.com
Add Comment
Computers Articles
1. Black Friday Tech Deals: Lock In Your 2026 Ai Readiness With Exclusive Ecf Data OffersAuthor: ECF Data
2. What Is Nova And How Does It Help Businesses?
Author: TrackHr App
3. Edge Development Platform Market: Powering Next-generation Distributed Applications
Author: Umangp
4. Enterprise Mobile App Development
Author: brainbell1021
5. E-commerce Web Development
Author: brainbell1021
6. Dynamics 365 Supply Chain Management T
Author: brainbell1021
7. Modern Software At Scale: A Practical Guide To Microservice Development
Author: Tech Gazebos
8. The Financial Cost Of Ignoring Computer Repairs: A Westlake Case Study
Author: Arun Singh
9. Cloud Computing Companies In India | Cloud Hosting Service Providers In India | Sathya Technosoft
Author: Sathya Technosoft
10. Embedded Systems Advantages And Disadvantages
Author: Embeddedhash
11. Why Essae Pos Machines Are Ideal For Retail Growth
Author: pbs
12. Best Wordpress Development Companies In India For Business Growth
Author: Web Panel Solutions
13. How Enterprises Leverage It Consulting Companies In The Usa For Cybersecurity
Author: Abiel
14. Cash Drawer Security Tips For Retailers | Prime Poskart
Author: prime poskart
15. Successful Vb6 Migration And Upgrade
Author: Tech Gazebos






