Assuming the DNS name of another system by either corrupting the name service cache of a victim system by poisoning various fields of data sent in response to the victim system's queries, by altering or corrupting the nameserver process on a nameserver which serves answers for any legitimate valid domain. The victim system receives its poisoned data (the answer may be for a completely different query then that of what is requested) when the victim system turns to the poisoned name server for answers.