session hijacking


(n.) Also referred to as TCP session hijacking, a security attack on a user session over a protected network. The most common method of session hijacking is called IP spoofing, when an attacker uses source-routed IP packets to insert commands into an active communication between two nodes on a network and disguising itself as one of the authenticated users. This type of attack is possible because authentication typically is only done at the start of a TCP session. Another type of session hijacking is known as a man-in-the-middle attack, where the attacker, using a sniffer, can observe the communication between devices and collect the data that is transmitted.

Read Also:

  • set-top box

    Often abbreviated STB, an electronic device that is connected to a communication channel, such as a phone, ISDN or cable television line, and produces output on a conventional television screen. Set-top boxes are commonly used to receive and decode digital television broadcasts and to interface with the Internet through the user��s television instead of a […]

  • setup

    (v) To install and configure hardware or software. Most Windows applications come with a program called SETUP.EXE or INSTALL.EXE, which installs the software on the computer’s hard disk. (n) The configuration of hardware or software.

  • shade

    In color, the word shade is used to reference how dark the color is. For example, hunter is a shade of green. Shades are derived from a combination of hue and black. Contrast with tint. See “The Science of Color” in the Did You Know… section of

  • shader

    Used in 3-D computer graphics a shader is a small program or set of algorithms that determines how 3-D surface properties of objects are rendered, and how light interacts with the object within a 3-D computer program. Newer GPUs calculate shaders where previously it was an algorithm calculated by the CPU.

  • shadow copy

    In some Windows operating systems, when a system restore point is requested, a shadow copy of a file or folder is created. The shadow copy is essentially a previous version of the file or folder at a specific point. See System Restore.


Disclaimer: session hijacking definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.