answersLogoWhite

0


Best Answer

ACK for the last received packet need not be sent as a new packet, but gets a free ride on the next outgoing data frame(using ACK field in the frame header). The technique is temporarily delaying outgoing ACKs, so that they can be hooked on the next outgoing data frame is called piggybacking. Piggybacking is one of the feature of TCP

User Avatar

Wiki User

9y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

15y ago

Piggybacking usually refers to carrying a person on someone's back but in computer terms it refers to a term used to refer to the access of the computer via a wireless connection.

This answer is:
User Avatar

User Avatar

Wiki User

11y ago

a super large group of computer in a network, sending large amounts of data to ur computer, also piggybacking is stealing wifi from a un protected network

This answer is:
User Avatar

User Avatar

Wiki User

13y ago

bidirectional path of communication

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is piggybacking in computer security?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What type of physical security device can you implement to counter piggybacking?

man-trap


A scheme where an intruder quickly follows an authenticated person through a security checkpoint?

Piggybacking


What is piggybacking?

While worms do not need another program to attach themselves to, viruses do. Piggybacking refers to the way that viruses infect or attach themselves to legitimate programs or documents to sneak onto your computer and attempt to infect it.


Is it legal piggybacking in Orange County?

yes.


What is computer and internet security?

Computer security refers to be protected from the viruses present inside your computer whereas Internet security refers to be protected from the malwares those could attack your computer through Internet.


What are the security and safety procedure within a computer environment?

what are the security and safty procedure in a computer environment


When was National Agency for Computer Security created?

National Agency for Computer Security was created in 2004.


1 What is the defining difference between computer security and information security?

Where computer security deals with the processes applied to computer system(s), information security concerns all of the aspects regarding the system of policies and/or procedures for identifying, controlling, and protecting information from unauthorized disclosure. While often synonymous, information security is actually a superset of computer security, encompassing the fields of data security, transmission security, network security, physical security, personal security, and personnel security,


Do I have to be a computer expert to properly setup a computer security camera?

Many computer security cameras do not require computer expertise to install. Most security cameras also come with a instruction manual for easy installation.


What has the author Deborah Russell written?

Norton is the leader in security software for your computer with more PC Magazine Editor's choice awards than any other security company. Start a free trial and protect your PC today! cutt.ly/rjeos1F


What has the author Tony Bradley written?

Tony Bradley has written: 'Understanding The Interregnum' 'Computer security 101' -- subject(s): Computer networks, Computer security, Internet, Security measures


What has the author Marshall D Abrams written?

Marshall D. Abrams has written: 'Tutorial computer and network security' -- subject(s): Computer networks, Computer security, Security measures 'Distributed processing and computer networks'