The technique of supplying a false IP address is called "spoofing" in general, and is easy to accomplish for all kinds of traffic. E-mail messages in particular are easy to spoof because message headers can be constructed manually, and built to include any information the builder desires. This explains how some spam shows up not only addressed to you, but also apparently from you. You can block this kind of thing easily in a lot of e-mail packages such as Outlook or Eudora by blocking e-mail from yourself (but that means you'll need another internal mechanism to save your sent messages, so you can keep a record of legitimate e-mails that you do send).
Dig Deeper on Network Security Monitoring and Analysis
Related Q&A from Ed Tittel
Disconnected VDI means remote users can access their desktops from anywhere, but there are some downsides.continue reading
VDI requires new hardware and software, so make sure you get some VDI training and certifications under your belt before you deploy virtual desktops.continue reading
Virtualized GPU technology is still new, so it's a good time to get in on the ground floor and learn how it renders graphics for remote users.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.