A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host.
in t nederlands
je doet gwoon voor als iemand anders daarom denkt de verzender dat jij een "vertrouwd" iemand bent..