See conversation hijacking and email spoofing. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction requires permission.
A lesser-known browser may spoof the user agent string and identify itself as a popular browser as long as it renders pages in the same manner. See user agent string. THIS DEFINITION IS FOR ...