it depends on the context...given the category you've posted in I'll guess you're referring to "IP spoofing", which involves faking the headers of packets coming from your computer so that they appear to come from a different TCP/IP address. This method is principally how Reflected Distributed Denial-of-Service attacks are carried out.