Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » TERM » E »

e-mail spoofing

Forging an e-mail header to make it appear as if it came from somewhere or someone other than the actual source. The main protocol that is used when sending e-mail -- SMTP -- does not include a way to authenticate. There is an SMTP service extension (RFC 2554) that allows an SMTP client to negotiate a security level with a mail server. But if this precaution is not taken anyone with the know-how can connect to the server and use it to send spoofed messages by altering the header information.

In some jurisdictions, e-mail spoofing anyone other than yourself is illegal.







TECH RESOURCES FROM OUR PARTNERS
DID YOU KNOW?
11 Tips to Boost Your Wi-Fi Signal

It's not just your lawnmower and household tools that your neighbor won't return. Our top picks include everything from updating device firmware... Read More »

Interesting Times: Transformation in the IT Channel

Business transformation will remain the buzzword of the moment as channel firms continue to assess the direction of their companies in the age of... Read More »

What is a Virtual Private network (VPN)?

Companies and organizations will use a VPN to communicate confidentially over a public network and to send voice, video or data. Read More »

QUICK REFERENCE
29 Free Android Apps for Cash-Strapped Students

From wacky alarm clocks to lecture hall tools and after class entertainment, these Android apps are a good fit for a student's life and budget. Read More »

Network Fundamentals Study Guide

A network is a group of two or more computer systems or devices, linked together to share resources, exchange files and electronic communications.... Read More »

Computer Architecture Study Guide

This Webopedia  study guide describes the different parts of a computer system and their relations. Read More »