Inserting the IP address of an authorized user into the transmission of an unauthorized user in order to gain illegal access to a computer system. Routers and other firewall implementations can be programmed to identify this discrepancy. See firewall.
Search For IP spoofing On ChannelWeb
Find the latest news and information on IP spoofing from across the Channelweb Network of IT Web sites.