Answer Posted / ritesh
In IP spoofing, an attacker gains unauthorized access to a
computer or a network by making it appear that a malicious
message has come from a trusted machine by “spoofing
Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What are the problems with older versions (1.0 and 1.0 B)?
What is DOS attack ?
Explain few applications of bluetooth?
Do you Know about OBEX Protocol?
What is bluetooth - a technology, a standard, an initiative, or a product?
Explain the data throughput speed of a bluetooth connection?
What is it - a technology, a standard, an initiative, or a product?
How secure is a Bluetooth network?
Define cabir worm?
What is the future direction of the Bluetooth standard?
Which method is primarily used for Voice transfer?
What companies are involved in the Bluetooth initiative?
What is broadcast?
what is meant by the term 'ip spoofing'?
What is the uses of ldap?