SPOOFING: There are many kinds of spoofing techniques which are used by the people to hack the systems or to get the critical information by showing it as legitimate process.
Different type of spoofing:
(1) IP spoofing.
(2) Content spoofing.
(3) Caller ID spoofing.
(4) Email spoofing.
(5) Phishing.
It would be difficult to explain all of them but for a general idea I will explain the content spoofing.
CONTENT SPOOFING: In this spoofing method which is generally used by the hackers in order to hack the sensitive data and information the hacker uses a special type of method in which the content shown to the users are shown legitimate but actually the contents are fake and the user processes all the information.
With the help of DHTML(Dynamic Hyper Text Markup Language) the hacker design dangerous content spoofing, they design forms, log-in applications. And when the user enters the sensitive data such as passwords, bank account numbers, credit cards etc the hackers easily get that information.
Some times what the hackers do to hack some good sites and change the contents and link it to an established website and when you access that site all of the users information can be hacked by them.
Different type of spoofing:
(1) IP spoofing.
(2) Content spoofing.
(3) Caller ID spoofing.
(4) Email spoofing.
(5) Phishing.
It would be difficult to explain all of them but for a general idea I will explain the content spoofing.
CONTENT SPOOFING: In this spoofing method which is generally used by the hackers in order to hack the sensitive data and information the hacker uses a special type of method in which the content shown to the users are shown legitimate but actually the contents are fake and the user processes all the information.
With the help of DHTML(Dynamic Hyper Text Markup Language) the hacker design dangerous content spoofing, they design forms, log-in applications. And when the user enters the sensitive data such as passwords, bank account numbers, credit cards etc the hackers easily get that information.
Some times what the hackers do to hack some good sites and change the contents and link it to an established website and when you access that site all of the users information can be hacked by them.