HOME

TheInfoList



OR:

Spoof, spoofs, spoofer, or spoofing may refer to: * Forgery of goods or documents *
Semen Semen, also known as seminal fluid, is an organic bodily fluid created to contain spermatozoa. It is secreted by the gonads (sexual glands) and other sexual organs of male or hermaphroditic animals and can fertilize the female ovum. Sem ...
, in Australian slang *
Spoof (game) Spoof is a strategy game, typically played as a gambling game, often in bars and pubs where the loser buys the other participants a round of drinks. The exact origin of the game is unknown, but one scholarly paper addressed it, and more general ' ...
, a guessing game *
Spoofing (finance) Spoofing is a disruptive algorithmic trading activity employed by traders to outpace other market participants and to manipulate markets. Spoofers feign interest in trading futures, stocks and other products in financial markets creating an illusi ...
, a disruptive algorithmic-trading tactic designed to manipulate markets __NOTOC__


Culture

* A type of satire, specifically a
parody A parody, also known as a spoof, a satire, a send-up, a take-off, a lampoon, a play on (something), or a caricature, is a creative work designed to imitate, comment on, and/or mock its subject by means of satiric or ironic imitation. Often its sub ...
, in which an original work is made fun of by creating a similar but altered work. *
Spoof film A parody film or spoof film is a subgenre of comedy film that parodies other film genres or films as pastiches, works created by imitation of the style of many different films reassembled together. Although the subgenre is often overlooked by cri ...
(aka parody film), a cinematographic genre *
Spoofing (anti-piracy measure) Spoofing, or decoying, is the practice of inundating online networks with bogus or incomplete files of the same name in an effort to reduce copyright infringement on file sharing File sharing is the practice of distributing or providing access ...
, a technique to curb unlawful online downloading


Science and technology

* Biometric spoofing, fooling a biometric identification device * DLL spoofing, using an insecure DLL loading routine to load a malicious DLL file


Networking and communications

*
Protocol spoofing Protocol spoofing is used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates. Spoofing techniques In most applications of protocol spoofing, a ...
, a technique to increase performance in data communications *
Spoofing attack In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. Internet Spoofing an ...
, the falsifying of data on a telecommunications network **
ARP spoofing In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends ( spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the a ...
**
Caller ID spoofing Caller ID spoofing is the practice of causing the telephone network to indicate to the receiver of a call that the originator of the call is a station other than the true originating station. This can lead to a caller ID display showing a phone ...
**
E-mail spoofing Email spoofing is the creation of email messages with a forged sender address. The term applies to email purporting to be from an address which is not actually the sender's; mail sent in reply to that address may bounce or be delivered to an unr ...
**
IP address spoofing In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address, for the purpose of impersonating another computing system. Background The basic protocol for sending ...
**
MAC spoofing MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address that is hard-coded on a network interface controller (NIC) cannot be changed. However ...
** Referrer spoofing **
SMS spoofing SMS spoofing is a technology which uses the short message service (SMS), available on most mobile phones and personal digital assistant A personal digital assistant (PDA), also known as a handheld PC, is a variety mobile device which functi ...
** Spoofed URL ** Website spoofing


See also

*
Meaconing Meaconing is the interception and rebroadcast of navigation signals. These signals are rebroadcast on the received frequency, typically, with power higher than the original signal, to confuse enemy navigation. Consequently, aircraft or ground stat ...
, the interception and rebroadcast of navigation signals *
Replay attack A replay attack (also known as a repeat attack or playback attack) is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary wh ...
, a network attack in which transmitted data is fraudulently repeated or delayed {{Disambiguation