KudoZ home » English to Spanish » Tech/Engineering

to spoof

Spanish translation: interceptar

Advertisement

Login or register (free and only takes a few minutes) to participate in this question.

You will also have access to many other tools and opportunities designed for those who have language-related jobs
(or are passionate about them). Participation is free and the site has a strict confidentiality policy.
GLOSSARY ENTRY (DERIVED FROM QUESTION BELOW)
English term or phrase:to spoof
Spanish translation:interceptar
Options:
- Contribute to this entry
- Include in personal glossary

11:16 Oct 28, 2000
English to Spanish translations [PRO]
Tech/Engineering
English term or phrase: to spoof
It is a computer term. The complete sentence is:" to spoof the MAC address of the destination server and the upstream router".

Thank you for your help.
Agua
Spain
Intercepción, alteración retransmisión.
Explanation:
Spoofing is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. That address is only used by the destination machine when it responds back to the source.
A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection.

However, IP spoofing is an integral part of many network attacks that do not need to see responses (blind spoofing).

Examples of spoofing:

man-in-the-middle
packet sniffs on link between the two end points, and can therefore pretend to be one end of the connection
routing redirect
redirects routing information from the original host to the hacker's host (this is another form of man-in-the-middle attack).
source routing
redirects indvidual packets by hackers host
blind spoofing
predicts responses from a host, allowing commands to be sent, but can't get immediate feedback.
flooding
SYN flood fills up receive queue from random source addresses; smurf/fraggle spoofs victims address, causing everyong respond to the victim.
Selected response from:

Jaime Aguirre
Grading comment
Guau!!!
Thank you very much for the whole explanation, apart from the help.
Mar
4 KudoZ points were awarded for this answer

Advertisement


Summary of answers provided
naInterceptar, desviar (la señal).Ivan Sanchez
naIntercepción, alteración retransmisión.Jaime Aguirre
naspoof, spufear, hacer un spoof
Gloria Nichols


  

Answers


46 mins
spoof, spufear, hacer un spoof


Explanation:
boy, does that sound awful.....! but I found a lot of references to it, one of which is below

Santa Tecla - Manual - CyberSpanGlish "S"
...ventana partida, ventana dividida spoof spufear, hacer un spoof...
http://www.santatecla.es/manual/chapter9.1/9.1s.html


    Reference: http://www.santatecla.es
Gloria Nichols
United States
Local time: 18:49
PRO pts in pair: 41
Login to enter a peer comment (or grade)

1 hr
Intercepción, alteración retransmisión.


Explanation:
Spoofing is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through the Internet, but ignore the "source IP" address. That address is only used by the destination machine when it responds back to the source.
A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection.

However, IP spoofing is an integral part of many network attacks that do not need to see responses (blind spoofing).

Examples of spoofing:

man-in-the-middle
packet sniffs on link between the two end points, and can therefore pretend to be one end of the connection
routing redirect
redirects routing information from the original host to the hacker's host (this is another form of man-in-the-middle attack).
source routing
redirects indvidual packets by hackers host
blind spoofing
predicts responses from a host, allowing commands to be sent, but can't get immediate feedback.
flooding
SYN flood fills up receive queue from random source addresses; smurf/fraggle spoofs victims address, causing everyong respond to the victim.



    Saludos y espero que te sirva.
Jaime Aguirre
PRO pts in pair: 430
Grading comment
Guau!!!
Thank you very much for the whole explanation, apart from the help.
Mar

Peer comments on this answer (and responses from the answerer)
Berni Armstrong

Yllart Martinez
Login to enter a peer comment (or grade)

3 hrs
Interceptar, desviar (la señal).


Explanation:
Luck!

Ivan Sanchez
Local time: 18:49
Native speaker of: Native in EnglishEnglish
PRO pts in pair: 731
Login to enter a peer comment (or grade)




Return to KudoZ list


KudoZ™ translation help
The KudoZ network provides a framework for translators and others to assist each other with translations or explanations of terms and short phrases.



See also:



Term search
  • All of ProZ.com
  • Term search
  • Jobs
  • Forums
  • Multiple search