Display title | Spoofing attack |
Default sort key | Spoofing attack |
Page length (in bytes) | 25,477 |
Namespace ID | 0 |
Page ID | 240679 |
Page content language | en - English |
Page content model | wikitext |
Indexing by robots | Allowed |
Number of redirects to this page | 0 |
Counted as a content page | Yes |
HandWiki item ID | None |
Edit | Allow all users (infinite) |
Move | Allow all users (infinite) |
Page creator | imported>LinuxGuru |
Date of page creation | 18:21, 6 February 2024 |
Latest editor | imported>LinuxGuru |
Date of latest edit | 18:21, 6 February 2024 |
Total number of edits | 1 |
Recent number of edits (within past 90 days) | 0 |
Recent number of distinct authors | 0 |
Description | Content |
Article description: (description ) This attribute controls the content of the description and og:description elements. | In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. |