Address Resolution Protocol (ARP) Poisoning (or ARP Cache Poisoning) modifies the IP address associated with the MAC address of a device. In layman’s terms, it means that a hacker can insert themselves between an endpoint and router (for example) and pretend to be the router to the endpoint and pretend to be the endpoint to the router. All data traffic that is meant to flow between endpoint and router will now pass through the hacker’s device.
You can find information about arp poisoning online at the Wikipedia. Once on the page, type "ARP spoofing" into the search field at the top of the page and press enter to bring up the information.
Of course you do. By using I think you mean the poisoning application. That app. is a built in feature on every modern command line interface (ARP poisoning).
Address Resolution Protocol (ARP) spoofing, also known as ARP poisoning or ARP Poison Routing (APR), is a technique used to attack an Ethernet http://wiki.answers.com/wiki/Ethernet or http://wiki.answers.com/wiki/Wireless_network. ARP Spoofing may allow an attacker to http://wiki.answers.com/wiki/Packet_sniffer http://wiki.answers.com/wiki/Data_frame on a http://wiki.answers.com/wiki/Local_area_network (LAN), modify the traffic, or stop the traffic altogether (known as a http://wiki.answers.com/wiki/Denial-of-service_attack). The attack can only be used on networks that actually make use of ARP and not another method of address resolution.
arp -a show arp
Dynamic ARP table entries are created whne a client makes an ARP request that cannot be satisfied by data already in the ARP table.
static arp
Gerald Arp is 186 cm.
Arp Schnitger was born in 1648.
Arp Schnitger died in 1719.
Robert Arp was born in 1970.
Bill Arp was born in 1826.
Bill Arp died in 1903.