The technique of supplying a false IP address is called "spoofing" in general, and is easy to accomplish for all kinds of traffic. E-mail messages in particular are easy to spoof because message headers can be constructed manually, and built to include any information the builder desires. This explains how some spam shows up not only addressed to you, but also apparently from you. You can block this kind of thing easily in a lot of e-mail packages such as Outlook or Eudora by blocking e-mail from yourself (but that means you'll need another internal mechanism to save your sent messages, so you can keep a record of legitimate e-mails that you do send).
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Dig Deeper on Network Security Monitoring and Analysis
Related Q&A from Ed Tittel
A network engineer job description will vary. Primarily, it depends on whether the job focuses on engineering a new network or on running a network ...continue reading
System administrator responsibilities are, fundamentally, about the care and feeding of systems but cover a broad range of possibilities when looking...continue reading
Get the inside scoop on a network manager's job description, workload and responsibilities which keep an organization's network infrastructure ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.