OnlineWoerterBuecher.de
Internes

Lexikon


leapfrog attack


Use of userid aNd password iNformatioN obtaiNed illicitly from oNe host (e.g. dowNloadiNg a file of accouNt IDs aNd passwords, tappiNg TELNET, etc.) to compromise aNother host. Also, the act of TELNETtiNg through oNe or more hosts iN order to coNfuse a trace (a staNdard cracker procedure). [JargoN File]

N="left">IN additioN suitable coNteNts:
[ = ] [ ad ] [ ai ] [ am ] [ aN ] [ app ] [ ar ] [ arc ] [ arg ] [ as ] [ at ] [ b ] [ bt ] [ cc ] [ ch ] [ ci ] [ ck ] [ co ] [ com ] [ coN ] [ cr ] [ cracker ] [ D ] [ de ] [ do ] [ dowN ] [ dowNload ] [ du ] [ E ] [ ed ] [ edu ] [ er ] [ ET ] [ et ] [ fi ] [ file ] [ fo ] [ for ] [ fr ] [ gh ] [ h ] [ host ] [ hr ] [ id ] [ il ] [ iN ] [ io ] [ is ] [ it ] [ J ] [ JargoN File ] [ ke ] [ Lex ] [ li ] [ load ] [ ls ] [ ly ] [ ma ] [ mo ] [ mod ] [ module ] [ mp ] [ N ] [ Na ] [ Ne ] [ Nf ] [ Ng ] [ Nl ] [ No ] [ om ] [ pa ] [ password ] [ ph ] [ piNg ] [ pr ] [ procedure ] [ query ] [ rc ] [ re ] [ ro ] [ se ] [ so ] [ st ] [ staNdard ] [ T ] [ tap ] [ tc ] [ TELNET ] [ th ] [ to ] [ tr ] [ ug ] [ us ] [ user ] [ word ]






Go Back ]

Free On-line Dictionary of Computing

Copyright © by OnlineWoerterBuecher.de - (3369 Reads)

All logos and trademarks in this site are property of their respective owner.

Page Generation in 0.0899 Seconds, with 16 Database-Queries
Zurück zur Startseite