without examplesFound in 2 dictionaries
Computer Science- The present edition has been significantly enriched with terms from such areas as logical device design and modeling, knowledge engineering, production computerization, artificial intelligence systems, computer networks, digital signal processing, parallel and pipeline computations, system analysis, Internet Technology.
- The present edition has been significantly enriched with terms from such areas as logical device design and modeling, knowledge engineering, production computerization, artificial intelligence systems, computer networks, digital signal processing, parallel and pipeline computations, system analysis, Internet Technology.
spoofing
имитация соединения, проф. спуфинг (способность маршрутизатора реагировать на некоторые сетевые запросы локально, без установления соединения с удаленным пунктом)
получение доступа путем обмана (ситуация, когда пользователь пытается соединиться с интернет-сервером, proxy-сервером или брандмауэром, используя ложный IP-адрес)
Telecoms (En-Ru)
spoofing
крипт.
перехват зашифрованного сигнала с его передачей в измененном виде незаметно для получателя
попытка несанкционированного входа в АИС от имени зарегистрированного пользователя
Unlock all free
thematic dictionaries
Examples from texts
An example of user identity spoofing is illegally accessing and then using another user's authentication information, such as username and password.Пример подмены личности пользователя — использование ворованных аутентификации данных (имени пользователя и пароля) для атаки на систему.Howard, Michael,LeBlanc, David / Writing Secure CodeХовард, Майкл,Лебланк, Дэвид / Защищенный кодЗащищенный кодХовард, Майкл,Лебланк, Дэвид© Оригинальное издание на английском языке, Microsoft Corporation, 2003© Перевод на русский язык, Microsoft Corporation, 2003 – 2004Writing Secure CodeHoward, Michael,LeBlanc, David© 2003 by Microsoft Corporation
MAC address spoofing is possible in 802.11 network interface cards (NICs) that allow the universally administered address (UAA) to be overwritten with a locally administered address (LAA).Имитация МАС-адреса возможна для сетевых карт стандарта 802.11, которые позволяют заменять универсально-назначаемый адрес (universally administered address, UAA) локально-назначаемым (locally administered address, LAA).Roshan, Pejman,Leary, Jonathan / 802.11 Wireless LAN FundamentalsРошан, Педжман,Лиэри, Джонатан / Основы построения беспроводных локальных сетей стандарта 802.11Основы построения беспроводных локальных сетей стандарта 802.11Рошан, Педжман,Лиэри, Джонатан© Cisco Press, 2004© Издательский дом "Вильямc", 2004802.11 Wireless LAN FundamentalsRoshan, Pejman,Leary, Jonathan© 2004 Cisco Systems, Inc.
This prevents spoofing.Это позволяет защитить систему от подмены адреса.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
I had a new short green dress and yellow kneesocks, my father was smiling over some unintelligible spoof that had passed between one diplomat and another that morning, and the Naranca bottles clinked together in our net bag.На мне было короткое зеленое платье с желтыми гольфами, отец улыбался, вспоминая какой-то непонятный для меня дипломатический розыгрыш на утреннем совещании, и бутылки «наранхи» позванивали в сетке.Kostova, Elisabeth / The HistorianКостова, Элизабет / ИсторикИсторикКостова, Элизабет© Перевод. Г. Соловьева, 2005© ООО "Издательство АСТ", 2005© Elizabeth Kostova, 2005The HistorianKostova, Elisabeth© 2005 by Elizabeth Kostova
In order for someone to continue to spoof an IP address, it is necessary to flood the host with ARP responses that overwrite legitimate ARP responses from the original host.Для того чтобы продолжать использовать неверные IP-адреса, взломщику достаточно заполнить узел ARP-ответами, перезаписывающими законные ARP-ответы исходного узла.Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.Антихакинг в сети. Трюки.Локхарт, Эндрю© 2004 O'Reilly Media, Inc.© Издание на русском языке ЗАО Издательский дом «Питер», 2005© Перевод на русский язык ЗАО Издательский дом «Питер», 2005Network Security HacksLockhart, Andrew© 2004 O'Reilly Media, Inc.
The TCP packet is spoofed from host B to host A with the appropriate sequence numbers.Пакеты TCP подменяются на отрезке от компьютера В до компьютера А — в них вставляются подходящие порядковые номера.Foster, James C.,Liu, Vincent T. / Writing Security Tools and ExploitsФостер, Джеймс К.,Лю, Винсент / Разработка средств безопасности и эксплойтовРазработка средств безопасности и эксплойтовФостер, Джеймс К.,Лю, Винсент© Оригинальное издание на английском языке. Syngress Publishing, Inc 2006© Перевод на русский язык и оформление издательство «Русская редакция»Writing Security Tools and ExploitsFoster, James C.,Liu, Vincent T.© 2006 by Syngress Publishing, Inc.
It is a simple matter to spoof an email address, as you have probably seen in some of the junk email that clutters up the Internet.Подделать адрес электронной почты очень легко, как вы, возможно, уже убедились на примере заполнившей Internet ненужной электронной почты.Ogletree, Terry William / Practical FirewallsОглтри, Терри Вильям / Firewalls. Практическое применение межсетевых экрановFirewalls. Практическое применение межсетевых экрановОглтри, Терри Вильям© by Que© Перевод на русский язык, оформление ДМК Пресс, 2001Practical FirewallsOgletree, Terry William
User translations
No translations for this text yet.
Be the first to translate it!
Collocations
DNS spoofing
имитация доменного имени
operator spoofing
обман оператора
advertising spoof
рекламная мистификация
advertising spoof
рекламный розыгрыш
spoofed mail
поддельное сообщение
Word forms
spoof
verb
Basic forms | |
---|---|
Past | spoofed |
Imperative | spoof |
Present Participle (Participle I) | spoofing |
Past Participle (Participle II) | spoofed |
Present Indefinite, Active Voice | |
---|---|
I spoof | we spoof |
you spoof | you spoof |
he/she/it spoofs | they spoof |
Present Continuous, Active Voice | |
---|---|
I am spoofing | we are spoofing |
you are spoofing | you are spoofing |
he/she/it is spoofing | they are spoofing |
Present Perfect, Active Voice | |
---|---|
I have spoofed | we have spoofed |
you have spoofed | you have spoofed |
he/she/it has spoofed | they have spoofed |
Present Perfect Continuous, Active Voice | |
---|---|
I have been spoofing | we have been spoofing |
you have been spoofing | you have been spoofing |
he/she/it has been spoofing | they have been spoofing |
Past Indefinite, Active Voice | |
---|---|
I spoofed | we spoofed |
you spoofed | you spoofed |
he/she/it spoofed | they spoofed |
Past Continuous, Active Voice | |
---|---|
I was spoofing | we were spoofing |
you were spoofing | you were spoofing |
he/she/it was spoofing | they were spoofing |
Past Perfect, Active Voice | |
---|---|
I had spoofed | we had spoofed |
you had spoofed | you had spoofed |
he/she/it had spoofed | they had spoofed |
Past Perfect Continuous, Active Voice | |
---|---|
I had been spoofing | we had been spoofing |
you had been spoofing | you had been spoofing |
he/she/it had been spoofing | they had been spoofing |
Future Indefinite, Active Voice | |
---|---|
I shall/will spoof | we shall/will spoof |
you will spoof | you will spoof |
he/she/it will spoof | they will spoof |
Future Continuous, Active Voice | |
---|---|
I shall/will be spoofing | we shall/will be spoofing |
you will be spoofing | you will be spoofing |
he/she/it will be spoofing | they will be spoofing |
Future Perfect, Active Voice | |
---|---|
I shall/will have spoofed | we shall/will have spoofed |
you will have spoofed | you will have spoofed |
he/she/it will have spoofed | they will have spoofed |
Future Perfect Continuous, Active Voice | |
---|---|
I shall/will have been spoofing | we shall/will have been spoofing |
you will have been spoofing | you will have been spoofing |
he/she/it will have been spoofing | they will have been spoofing |
Future in the Past Indefinite, Active Voice | |
---|---|
I should/would spoof | we should/would spoof |
you would spoof | you would spoof |
he/she/it would spoof | they would spoof |
Future in the Past Continuous, Active Voice | |
---|---|
I should/would be spoofing | we should/would be spoofing |
you would be spoofing | you would be spoofing |
he/she/it would be spoofing | they would be spoofing |
Future in the Past Perfect, Active Voice | |
---|---|
I should/would have spoofed | we should/would have spoofed |
you would have spoofed | you would have spoofed |
he/she/it would have spoofed | they would have spoofed |
Future in the Past Perfect Continuous, Active Voice | |
---|---|
I should/would have been spoofing | we should/would have been spoofing |
you would have been spoofing | you would have been spoofing |
he/she/it would have been spoofing | they would have been spoofing |
Present Indefinite, Passive Voice | |
---|---|
I am spoofed | we are spoofed |
you are spoofed | you are spoofed |
he/she/it is spoofed | they are spoofed |
Present Continuous, Passive Voice | |
---|---|
I am being spoofed | we are being spoofed |
you are being spoofed | you are being spoofed |
he/she/it is being spoofed | they are being spoofed |
Present Perfect, Passive Voice | |
---|---|
I have been spoofed | we have been spoofed |
you have been spoofed | you have been spoofed |
he/she/it has been spoofed | they have been spoofed |
Past Indefinite, Passive Voice | |
---|---|
I was spoofed | we were spoofed |
you were spoofed | you were spoofed |
he/she/it was spoofed | they were spoofed |
Past Continuous, Passive Voice | |
---|---|
I was being spoofed | we were being spoofed |
you were being spoofed | you were being spoofed |
he/she/it was being spoofed | they were being spoofed |
Past Perfect, Passive Voice | |
---|---|
I had been spoofed | we had been spoofed |
you had been spoofed | you had been spoofed |
he/she/it had been spoofed | they had been spoofed |
Future Indefinite, Passive Voice | |
---|---|
I shall/will be spoofed | we shall/will be spoofed |
you will be spoofed | you will be spoofed |
he/she/it will be spoofed | they will be spoofed |
Future Perfect, Passive Voice | |
---|---|
I shall/will have been spoofed | we shall/will have been spoofed |
you will have been spoofed | you will have been spoofed |
he/she/it will have been spoofed | they will have been spoofed |
spoofing
noun
Singular | Plural | |
Common case | spoofing | spoofings |
Possessive case | spoofing's | spoofings' |