about icon-addNote android4 Answer apple4 icon-appStoreEN icon-appStoreES icon-appStorePT icon-appStoreRU Imported Layers Copy 7 icon-arrow-spined icon-ask icon-attention icon-bubble-blue icon-bubble-red ButtonError ButtonLoader ButtonOk icon-cake icon-camera icon-card-add icon-card-calendar icon-card-remove icon-card-sort chrome-extension-ru chrome-extension-es-mx chrome-extension-pt-br chrome-extension-ru comment comment icon-cop-cut icon-cop-star Cross Dislike icon-editPen icon-entrance icon-errorBig facebook flag flag_vector icon-globe icon-googlePlayEN icon-googlePlayRU icon-greyLoader icon-cake Heart 4EB021E9-B441-4209-A542-9E882D3252DE Created with sketchtool. Info Kebab icon-lamp icon-lampBig icon-learnHat icon-learning-hat Dislike Loup Loup icon-more icon-note icon-notifications icon-pen Pencil icon-play icon-plus-light icon-plus icon-rosie-cut Rune scrollUp Share-icon Shevron-Down Shevron Left Shevron Right sound sound1 sound2 sound3 sound4 sound2 icon-star Swap icon-translate Trash icon-tutor-ellipsis icon-tutor-flip Tutor folder icon icon-tutor-learned icon-twoWayArrow Mezhdunarodny_logotip_VK vk icon-word pen_icon Logo Logo Logo
without examplesFound in 2 dictionaries

Computer Science
  • The present edition has been significantly enriched with terms from such areas as logical device design and modeling, knowledge engineering, production computerization, artificial intelligence systems, computer networks, digital signal processing, parallel and pipeline computations, system analysis, Internet Technology.

spoofing

  1. имитация соединения, проф. спуфинг (способность маршрутизатора реагировать на некоторые сетевые запросы локально, без установления соединения с удаленным пунктом)

  2. получение доступа путем обмана (ситуация, когда пользователь пытается соединиться с интернет-сервером, proxy-сервером или брандмауэром, используя ложный IP-адрес)

Telecoms (En-Ru)

spoofing

крипт.

  1. перехват зашифрованного сигнала с его передачей в измененном виде незаметно для получателя

  2. попытка несанкционированного входа в АИС от имени зарегистрированного пользователя

Unlock all free
thematic dictionaries

Examples from texts

An example of user identity spoofing is illegally accessing and then using another user's authentication information, such as username and password.
Пример подмены личности пользователя — использование ворованных аутентификации данных (имени пользователя и пароля) для атаки на систему.
Howard, Michael,LeBlanc, David / Writing Secure CodeХовард, Майкл,Лебланк, Дэвид / Защищенный код
Защищенный код
Ховард, Майкл,Лебланк, Дэвид
© Оригинальное издание на английском языке, Microsoft Corporation, 2003
© Перевод на русский язык, Microsoft Corporation, 2003 – 2004
Writing Secure Code
Howard, Michael,LeBlanc, David
© 2003 by Microsoft Corporation
MAC address spoofing is possible in 802.11 network interface cards (NICs) that allow the universally administered address (UAA) to be overwritten with a locally administered address (LAA).
Имитация МАС-адреса возможна для сетевых карт стандарта 802.11, которые позволяют заменять универсально-назначаемый адрес (universally administered address, UAA) локально-назначаемым (locally administered address, LAA).
Roshan, Pejman,Leary, Jonathan / 802.11 Wireless LAN FundamentalsРошан, Педжман,Лиэри, Джонатан / Основы построения беспроводных локальных сетей стандарта 802.11
Основы построения беспроводных локальных сетей стандарта 802.11
Рошан, Педжман,Лиэри, Джонатан
© Cisco Press, 2004
© Издательский дом "Вильямc", 2004
802.11 Wireless LAN Fundamentals
Roshan, Pejman,Leary, Jonathan
© 2004 Cisco Systems, Inc.
This prevents spoofing.
Это позволяет защитить систему от подмены адреса.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
I had a new short green dress and yellow kneesocks, my father was smiling over some unintelligible spoof that had passed between one diplomat and another that morning, and the Naranca bottles clinked together in our net bag.
На мне было короткое зеленое платье с желтыми гольфами, отец улыбался, вспоминая какой-то непонятный для меня дипломатический розыгрыш на утреннем совещании, и бутылки «наранхи» позванивали в сетке.
Kostova, Elisabeth / The HistorianКостова, Элизабет / Историк
Историк
Костова, Элизабет
© Перевод. Г. Соловьева, 2005
© ООО "Издательство АСТ", 2005
© Elizabeth Kostova, 2005
The Historian
Kostova, Elisabeth
© 2005 by Elizabeth Kostova
In order for someone to continue to spoof an IP address, it is necessary to flood the host with ARP responses that overwrite legitimate ARP responses from the original host.
Для того чтобы продолжать использовать неверные IP-адреса, взломщику достаточно заполнить узел ARP-ответами, перезаписывающими законные ARP-ответы исходного узла.
Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.
Антихакинг в сети. Трюки.
Локхарт, Эндрю
© 2004 O'Reilly Media, Inc.
© Издание на русском языке ЗАО Издательский дом «Питер», 2005
© Перевод на русский язык ЗАО Издательский дом «Питер», 2005
Network Security Hacks
Lockhart, Andrew
© 2004 O'Reilly Media, Inc.
The TCP packet is spoofed from host B to host A with the appropriate sequence numbers.
Пакеты TCP подменяются на отрезке от компьютера В до компьютера А — в них вставляются подходящие порядковые номера.
Foster, James C.,Liu, Vincent T. / Writing Security Tools and ExploitsФостер, Джеймс К.,Лю, Винсент / Разработка средств безопасности и эксплойтов
Разработка средств безопасности и эксплойтов
Фостер, Джеймс К.,Лю, Винсент
© Оригинальное издание на английском языке. Syngress Publishing, Inc 2006
© Перевод на русский язык и оформление издательство «Русская редакция»
Writing Security Tools and Exploits
Foster, James C.,Liu, Vincent T.
© 2006 by Syngress Publishing, Inc.
It is a simple matter to spoof an email address, as you have probably seen in some of the junk email that clutters up the Internet.
Подделать адрес электронной почты очень легко, как вы, возможно, уже убедились на примере заполнившей Internet ненужной электронной почты.
Ogletree, Terry William / Practical FirewallsОглтри, Терри Вильям / Firewalls. Практическое применение межсетевых экранов
Firewalls. Практическое применение межсетевых экранов
Оглтри, Терри Вильям
© by Que
© Перевод на русский язык, оформление ДМК Пресс, 2001
Practical Firewalls
Ogletree, Terry William

Add to my dictionary

spoofing1/4
имитация соединения; спуфинг

User translations

No translations for this text yet.
Be the first to translate it!

Collocations

DNS spoofing
имитация доменного имени
operator spoofing
обман оператора
advertising spoof
рекламная мистификация
advertising spoof
рекламный розыгрыш
spoofed mail
поддельное сообщение

Word forms

spoof

verb
Basic forms
Pastspoofed
Imperativespoof
Present Participle (Participle I)spoofing
Past Participle (Participle II)spoofed
Present Indefinite, Active Voice
I spoofwe spoof
you spoofyou spoof
he/she/it spoofsthey spoof
Present Continuous, Active Voice
I am spoofingwe are spoofing
you are spoofingyou are spoofing
he/she/it is spoofingthey are spoofing
Present Perfect, Active Voice
I have spoofedwe have spoofed
you have spoofedyou have spoofed
he/she/it has spoofedthey have spoofed
Present Perfect Continuous, Active Voice
I have been spoofingwe have been spoofing
you have been spoofingyou have been spoofing
he/she/it has been spoofingthey have been spoofing
Past Indefinite, Active Voice
I spoofedwe spoofed
you spoofedyou spoofed
he/she/it spoofedthey spoofed
Past Continuous, Active Voice
I was spoofingwe were spoofing
you were spoofingyou were spoofing
he/she/it was spoofingthey were spoofing
Past Perfect, Active Voice
I had spoofedwe had spoofed
you had spoofedyou had spoofed
he/she/it had spoofedthey had spoofed
Past Perfect Continuous, Active Voice
I had been spoofingwe had been spoofing
you had been spoofingyou had been spoofing
he/she/it had been spoofingthey had been spoofing
Future Indefinite, Active Voice
I shall/will spoofwe shall/will spoof
you will spoofyou will spoof
he/she/it will spoofthey will spoof
Future Continuous, Active Voice
I shall/will be spoofingwe shall/will be spoofing
you will be spoofingyou will be spoofing
he/she/it will be spoofingthey will be spoofing
Future Perfect, Active Voice
I shall/will have spoofedwe shall/will have spoofed
you will have spoofedyou will have spoofed
he/she/it will have spoofedthey will have spoofed
Future Perfect Continuous, Active Voice
I shall/will have been spoofingwe shall/will have been spoofing
you will have been spoofingyou will have been spoofing
he/she/it will have been spoofingthey will have been spoofing
Future in the Past Indefinite, Active Voice
I should/would spoofwe should/would spoof
you would spoofyou would spoof
he/she/it would spoofthey would spoof
Future in the Past Continuous, Active Voice
I should/would be spoofingwe should/would be spoofing
you would be spoofingyou would be spoofing
he/she/it would be spoofingthey would be spoofing
Future in the Past Perfect, Active Voice
I should/would have spoofedwe should/would have spoofed
you would have spoofedyou would have spoofed
he/she/it would have spoofedthey would have spoofed
Future in the Past Perfect Continuous, Active Voice
I should/would have been spoofingwe should/would have been spoofing
you would have been spoofingyou would have been spoofing
he/she/it would have been spoofingthey would have been spoofing
Present Indefinite, Passive Voice
I am spoofedwe are spoofed
you are spoofedyou are spoofed
he/she/it is spoofedthey are spoofed
Present Continuous, Passive Voice
I am being spoofedwe are being spoofed
you are being spoofedyou are being spoofed
he/she/it is being spoofedthey are being spoofed
Present Perfect, Passive Voice
I have been spoofedwe have been spoofed
you have been spoofedyou have been spoofed
he/she/it has been spoofedthey have been spoofed
Past Indefinite, Passive Voice
I was spoofedwe were spoofed
you were spoofedyou were spoofed
he/she/it was spoofedthey were spoofed
Past Continuous, Passive Voice
I was being spoofedwe were being spoofed
you were being spoofedyou were being spoofed
he/she/it was being spoofedthey were being spoofed
Past Perfect, Passive Voice
I had been spoofedwe had been spoofed
you had been spoofedyou had been spoofed
he/she/it had been spoofedthey had been spoofed
Future Indefinite, Passive Voice
I shall/will be spoofedwe shall/will be spoofed
you will be spoofedyou will be spoofed
he/she/it will be spoofedthey will be spoofed
Future Perfect, Passive Voice
I shall/will have been spoofedwe shall/will have been spoofed
you will have been spoofedyou will have been spoofed
he/she/it will have been spoofedthey will have been spoofed

spoofing

noun
SingularPlural
Common casespoofingspoofings
Possessive casespoofing'sspoofings'