pp.
Attempting to catch a computer hacker by tracing the path that the intruder used to infiltrate a system.
Example Citation:
"Intrusions into government computers are detected only about 10 percent of the time....It is relatively easy to mask the true identity of the attacker and to lay false trails to frustrate 'back hacking."
— Gregory L. Vistica and Evan Thomas, "The Secret Hacker Wars," Newsweek
Related Words:
Category:
New words. 2013.