Definitions for "spoofing"
a practice of Spammers who use misleading information in the subject line of your incoming email to entice you to open a message which usually contains ads for undesirable or unwanted products, etc.
This is a technique used to fool a person or system into thinking it is dealing with a legitimate user or system by 'faking' the from credentials or other address details.
Impersonating another person or computer, usually by providing a false email name, URL or IP address.
The alteration or creation of a document with intent to deceive an electronic catalog or filing system. Any technique that increases the potential position of a site at the expense of the quality of the search engine's database. See also spamming.
A ploy designed to deceive the observer into believing that an operation has gone bad when, in fact, it has been put into another compartment.
Spoofing refers to intentionally deceiving an Internet user into believing the website or e-mail he/she is viewing is authentic as to its apparent origin, when in reality it was developed and/or communicated by another entity.
Keywords:  cisco, alive, keepalive, ddr, router
1. Scheme used by Cisco routers to cause a host to treat an interface as if it were up and supporting a session. The router spoofs replies to keepalive messages from the host in order to convince that host that the session still exists. Spoofing is useful in routing environments such as DDR, in which a circuit-switched link is taken down when there is no traffic to be sent across it in order to save toll charges. See also DDR. 2. The act of a packet illegally claiming to be from an address from which it was not actually sent. Spoofing is designed to foil network security mechanisms such as filters and access lists.
A method of fooling network end stations into believing that keep-alive signals have come from and return to the host. Polls are received and returned locally at either end of the network and are transmitted only over the open network if there is a condition change.
This reduces network overload by reducing traffic on a WAN (such as signals that repeatedly state a device is alive). The router or bridge can tell a remote device that a LAN device is still powered on instead of the LAN device informing the remote device it is still powered on. Also see Bridge LAN Router Traffic WAN
The process of replicating the GPS code so that the user computes incorrect position solutions.
Informative that voice deception is being employed.
The intentional deception of a GPS receiver by a simulated satellite signal designed to produce an error in the navigation solution.
Keywords:  spamdexing, see
See spamdexing.
A common term to describe the action of the PEP when optimising the TCP data stream. Spoofing is an internal emulation of processes by acknowledging control and supervisory data frames locally rather than transmitting them over the satellite link.
Keywords:  interception, see
See Interception.
Keywords:  aka
aka:IP Spoofing.
Stock market manipulation in which a trader with a position in a stock places...
Keywords:  farm, answers, behind, load, request
When a device, such as a load balancer, answers a request in the name of another device, such as a web server in a farm located behind it.