IP Spoofing
When IP spoofing is used to hijack a browser, a visitor who types in the URL (Uniform Resource Locater) of a legitimate site is taken to a fraudulent Web page created by the hijacker. For example, if the hijacker spoofed the Library of Congress Web site, then any Internet user who typed in the URL www.loc.gov would see spoofed content created by the hijacker.
If a user interacts with dynamic content on a spoofed page, the highjacker can gain access to sensitive information or computer or network resources. He could steal or alter sensitive data, such as a credit card number or password, or install malware . The hijacker would also be able to take control of a compromised computer to use it as part of a zombie army in order to send out spam.
Web site administrators can minimize the danger that their IP addresses will be spoofed by implementing hierarchical or one-time passwords and data encryption/decryption techniques. Users and administrators can protect themselves and their networks by installating and implementating firewalls that block outgoing packets with source addresses that differ from the IP address of the user's computer or internal network.
2 Comments:
Here is the error message I received:
Your IP address is temporarily blocked because you or someone else from your IP or someone else using the same proxy as you have recently used this service.
By
Kodiak, at November 02, 2006 9:25 PM
that is really an evil thing to do to someone. I agree that it has to feel like someone has broken into your home. I am sorry this has happened.
By
Swinging Sammy, at November 05, 2006 6:36 PM
Post a Comment
<< Home