Примеры использования Spoofing на Английском языке и их переводы на Русский язык
{-}
-
Colloquial
-
Official
It's called"spoofing.
Spoofing and intrusiveness.
What about spoofing?
What about spoofing texts, calls or WhatsApp?
This is commonly called IP spoofing.
Spoofing your location is very simple.
Widih Matar discovered a URL spoofing issue.
Rely on IP address spoofing protection if available.
It's disrupting the data from the phones, spoofing the GPS.
If Unicode spoofing is detected, the message is considered to be spam.
Hundreds of hijacked servers spoofing various sites.
Content spoofing via Flash applet in the embedded tinyMCE media plugin.
Chamal de Silva discovered an address bar spoofing issue.
We also provide spoofing text messages, spoof phone calls and WhatsApp!
So someone else sent that text to Jordan through a spoofing Web site.
Unicode spoofing protection, if you want to enable Unicode spoofing protection.
Both the text andcall to Jordan's cell originated from a spoofing site.
I made that call through a spoofing Web site that anyone with an Internet connection has access to.
Here are the most important things you have to know about spoofing emails.
Email spoofing is the easiest to recognize as it targets users directly.
LARs are vulnerable to appropriation, as well as hacking and spoofing.
Function to prevent ARP Spoofing attacks prevents mass mailing false ARP- posts hackers.
The underlying browser engine allows address bar spoofing through drag-and-drop.
ARP Spoofing Prevention prevents malicious intruders from sending massive fake ARP messages through a manipulated source.
Send altered, deceptive or false source-identifying information,including“spoofing” or“phishing”;
To prevent ARP Spoofing attacks the switch uses the Packet Control ACLs to block packets containing false ARP-message.
Is fraudulent or misleading, deceptive orcontains false source-identifying information, spoofing or phishing.
IP spoofing and ARP spoofing in particular may be used to leverage man-in-the-middle attacks against hosts on a computer network.
Exploits are commonly classified according to the type of vulnerability they exploit, such as zero-day,DoS, spoofing and XXS.
This flaw allows spoofing the identity of the caller and gaining root privileges from an unprivileged account.