because the token is changed each time the form is drawn, a would-be attacker would have to get an instance of the sending form, strip out the token, and put it in their spoofing version of the form.
由于在每次调用表单时都会更改标记,因此想要成为攻击者就必须获得发送表单的实例,去掉标记,并把它放到假表单中。
surely the real steve jobs of apple cannot be behind this twitter account (despite its massive 333, 000 followers) or this facebook page. the possibilities for spoofing seem endless.
当然真正的苹果ceo斯蒂芬.乔布斯无法隐藏在微博账户(尽管有333,000的追随者)或者facebook中,整蛊欺骗似乎没有结束的可能。
this is not to track everyone’s mail, but to prevent bad guys from spoofing good guys.
这个不需要追蹤每一封信,但是能够阻止恶意入侵者的欺骗。
web site developers should be wary of anyone spoofing the get and post requests sent to them.
网站开发人员应该小心发送给他们的get和post请求受到欺骗。
first discovered in the ‘90s, caller id spoofing allows an unscrupulous sort to choose whatever number he or she would like for their caller id.
在九十年代时,人们首次发现,来电身份伪装可以让用户肆无忌惮的选择任意号码作为他们的来电身份。
more specifically, ssh is a more secure utility that does not transmit passwords in clear text, and performs much more robust checks to ensure that clients are not spoofing their hostname.
更明确地说,ssh是一种更安全的工具,不以明文传输密码,并且执行更加健壮的检查,以确保客户机不是在欺骗它们的主机名。
as a result, any application of ip spoofing requires a significant amount of technical depth.
因此,ip欺骗的任何应用都需要大量技术高深的知识。
through the addition of out-of-band spoofing from some other source.
通过添加一些其他来源的带外(out-of-band)欺骗。
third, spoofing attacks are difficult to execute.
第三,欺骗攻击难以执行。
vendor fud (fear, uncertainty, and doubt spread to sell product) aside, there are really not that many attack tools that present a complete one-stop, no-brains-required spoofing solution.
除了供应商fud(担心、不确定性和怀疑影响产品销售)外,确实没有那么多攻击工具提供一步到位并且不需动脑的欺骗解决方案。
plus, this attack is far easier to launch than the more sophisticated spoofing attacks.
另外,启动这一攻击比启动更复杂的欺骗攻击容易得多。
for instance, pseudo-random numbers are used for process ids and packet ids, which makes spoofing significantly more difficult for a would-be attacker.
例如,伪随机数可用于进程id和包id,这使得那些想要进行攻击的人很难进行欺骗。
spoofing can be interpreted as the network security term used for forging.
电子欺骗可以解释成用于伪造的网络安全术语。