The technique of supplying a false IP address is called "spoofing" in general, and is easy to accomplish for all kinds of traffic. E-mail messages in particular are easy to spoof because message headers can be constructed manually, and built to include any information the builder desires. This explains how some spam shows up not only addressed to you, but also apparently from you. You can block this kind of thing easily in a lot of e-mail packages such as Outlook or Eudora by blocking e-mail from yourself (but that means you'll need another internal mechanism to save your sent messages, so you can keep a record of legitimate e-mails that you do send).
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Dig Deeper on Network Security Monitoring and Analysis
Related Q&A from Ed Tittel
The Windows ADK can help ensure Windows 10 compatibility for apps, software and hardware. There are six key steps to the installation process.continue reading
A network engineer job description will vary. Primarily, it depends on whether the job focuses on engineering a new network or on running a network ...continue reading
System administrator responsibilities are, fundamentally, about the care and feeding of systems but cover a broad range of possibilities when looking...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.