URL spoofing

Posted on 2003-12-12
Last Modified: 2013-12-04
Will ad-aware, spybotchSD, antivir help?
Question by:simala
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
LVL 32

Expert Comment

ID: 9928538
For these kind of things something has to be installed on your computer, so I think ad/spyware and/or virusscanners will prevent these kind of things in the near future.



Author Comment

ID: 9928674
Why it doesn't apply to Netscape Navigator?
Do you think, it is always better to type the URL yourself rather than clicking the link believing it would take you there?
LVL 49

Expert Comment

ID: 9928696
>> ad-aware, spybotchSD, antivir

These cannot help as of today. Atleast I have seen most of these scams come as an genuine email . You have to really careful when you respond to these kind of emails. To be on the safest side , donot send any of your personal information over email whatsoever.  Keep your IE updated regularly ..

[Live Webinar] The Cloud Skills Gap

As Cloud technologies come of age, business leaders grapple with the impact it has on their team's skills and the gap associated with the use of a cloud platform.

Join experts from 451 Research and Concerto Cloud Services on July 27th where we will examine fact and fiction.

LVL 49

Expert Comment

ID: 9928706

Even if you type the url in the address bar, if the hackers had already spoofed the URL it will redirect you to the bad website rather than the correct one.  CLicking the link would also turn up the same way. So either way it is going to harmful


Author Comment

ID: 9928758
to Sunray:
Have you tried the ?
What does "test exploit" mean?
LVL 49

Accepted Solution

sunray_2003 earned 30 total points
ID: 9928823
I had not tried that until I had seen your comment.

See if you are not familiar with general url forwarding this is it .
Let us assume there is a domain . the owners of plan to buy another domain and call it .Now they want URL forwarding of so that when anyone going to internet types in , it should display the contents of

So they can do in 2 ways .

One is if users type in in the address bar , the address bar would remain at and the contents of come up
if the users type in in the address bar , would appear in the address bar and the contents of would be displayed.

See this is general URL forwarding. Now hackers would have more sophistication in this and might it such a way that it would appear to be correct website but when you type in information online ,it might go to their database..

Well this is general information ..


Author Comment

ID: 9928898
Why Netscape is immune?

Featured Post

Ready to trade in that old firewall?

Whether you need to trade-up to a shiny new Firebox or just ready to upgrade from whatever appliance you're using now, WatchGuard has the right appliance for you! Find your perfect Firebox today with appliance sizing tool!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question