leapfrog attackn. Use of userid and password information obtained illicitly from one host (e.g., downloading a file of account IDs and passwords, tapping TELNET, etc.) to compromise another host. Also, the act of TELNETting through one or more hosts in order to confuse a trace (a standard cracker procedure).
|a children's mummer's parade, as on the Fourth of July, with prizes for the best costumes.|
|a printed punctuation mark (‽), available only in some typefaces, designed to combine the question mark (?) and the exclamation point (!), indicating a mixture of query and interjection, as after a rhetorical question.|