Quick Reference

The process of gaining access to a network by exploiting the fact that a user has left his or her computer and not logged off. The derfer uses the computer to carry out acts such as reading private files. The term is derived from reversing the name of the original victim of this crime.

Subjects: Computing.

Reference entries