Show Summary Details

Quick Reference

The process of gaining access to a network by exploiting the fact that a user has left his or her computer and not logged off. The derfer uses the computer to carry out acts such as reading private files. The term is derived from reversing the name of the original victim of this crime.

Subjects: Computing.

Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.