leaky heap
= L =
leech
leapfrog attack n.
Use of userid and password information
obtained illicitly from one host (e.g., downloading a file of
account IDs and passwords, tapping TELNET, etc.) to compromise
another host. Also, the act of TELNETting through one or more
hosts in order to confuse a trace (a standard cracker procedure).
--The Jargon File version 4.3.1, ed. ESR, autonoded by rescdsk.