Fake has been designed to switch in backup servers (especially Mail, Web and Proxy servers) on a LAN during periods of both unscheduled and scheduled down time. Fake allows you to take over the IP address (either physical or an IP alias) of another machine in the LAN by bringing up an additional interface and making use of ARP spoofing. It is designed to enable automated invocation via systems like Mon that monitor server availability. Fake can also be used in conjunction with load balancing mecanisms.
released on 8 July 2009
|License||Verified by||Verified on||Notes|
|GPLv2||Janet Casey||8 January 2002|
Leaders and contributors
Resources and communication
This entry (in part or in whole) was last reviewed on 30 January 2017.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.