See conversation hijacking and email spoofing. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction requires permission.
Routers and other firewall implementations can be programmed to identify this discrepancy. See firewall. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction requires permission.