Show Summary Details

Quick Reference

A program which imitates a computer during a log-in and reads account names and passwords in order to gain access to a network or a user's files. This is a particular example of a Trojan horse attack on a system.

Subjects: Computing.

Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.