Compiled by JILL BAKER THE fast moving world of computers is riddled with jargon and I industry phrases to match the hi tech pace the computer sets. Future 'Age offers this (by no means exhaustive) selection of the most common expressions used to describe the techniques used by bent programmers to fiddle the computer: DATA DIDDLING Probably the most common form of computer crime. It involves. changing one piece of data for another. PIGGYBACKING “This can be done in several ways. Physically,the intruder can wait outside the computer centre’s locked door, hands full of computer tapes, ‘and ask the authorised user to open the door for him. Electronically, the communication line of an authorised user can be tapped and access to the main computer gained by using his password clearance or a hidden terminal can be connected to the system using telephone switching equipment. ZAPPING and SUPERZAPPING ‘Superzapping can make use of the computer's universal access program Which allows entry {o the system n cases of malfunction. This key is extremely dangerous in the wrong hands where it can be uséd to modify, destroy or alter a program. A program PATCH adds instructions to a program to direct or alter s course Al called browsing, this involves looking for information i or around a ‘computer after a task has been completed. It can be as simple as Searching rubbish bins for discarded computer printouts or involve a ‘more sophisticated search of the computer for residua data after a jo
https://assets.chaos.social/media_attachments/files/113/838/955/393/855/840/original/4c72b644e7e640d9.png