1 Pretending to be another user, usually in order to obtain illegal access to a computer network.
2 Used to describe the process whereby a piece of hardware such as a telephone or a client computer is configured to appear as a different telephone or client.