IP spoofing


(ī-pē spoof´ing) (n.) A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host.

Newer routers and firewall arrangements can offer protection against IP spoofing.

Read Also:

  • IP switching

    (n.) A type of IP routing developed by Ipsilon Networks, Inc. Unlike conventional routers, IP switching routers use ATM hardware to speed packets through networks. Although the technology is new, it appears to be considerably faster than older router techniques.

  • IPsec

    Short for IP Security, a set of protocols developed by the IETF to support secure exchange of packets at the IP layer. IPsec has been deployed widely to implement Virtual Private Networks (VPNs). IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the […]

  • IRAP

    Acronym for International Roaming Access Protocols. The International Roaming Access Protocols (IRAP) is a selection of methods for constructing wireless infrastructures. * This is a set of proven, standards-based interfaces that establish a common baseline of features to facilitate seamless network interoperability. IRAP is an open framework, or profiles of a set of core protocols, […]

  • IRC

    Short for Internet Relay Chat, a chat system developed by Jarkko Oikarinen in Finland in the late 1980s. IRC has become very popular as more people get connected to the Internetbecause it enables people connected anywhere on the Internet to join in live discussions. Unlike older chat systems, IRC is not limited to just two […]

  • IRG

    Short for interrecord gap, the space between two consecutive physical blocks on a data recording medium, such as a hard drive or a magnetic tape. IRGs are used as markers for the end of data and also as safety margins for data overwrites. An interrecord gap is also referred to as a interblock gap.


Disclaimer: IP spoofing definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.