Inserting the IP address of an authorized user into the transmission of an unauthorized user in order to gain illegal access to a computer system ... THIS DEFINITION IS FOR PERSONAL USE ONLY.
See conversation hijacking and email spoofing. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction requires permission.