wardriving

(redirected from War driving)
Also found in: Encyclopedia.
Related to War driving: Bluejacking, piggybacking
Translations

wardriving

n (Comput, Telec) → Wardriving nt
References in periodicals archive ?
She became second-in-command of the Calais Convoy in late 1915 and spent the rest of the war driving ambulances and improving conditions for the wounded on the Western Front.
He already has the police shooting up a drug war driving up fear in the street.
Tenders are invited for Printing of Civil War Driving Tour Guide
MODI- NITISH HOARDING WAR DRIVING through the streets of Patna one is overwhelmed by the sheer number of political hoardings that dominate the capital's skyline.
Harry talks movingly of his service as a leading aircraftsman in the RAF during the Second World War driving crash vehicles to help returning bomber crews.
The women were provoked at the time by the sight of US female soldiers who were taking part in the first Gulf War driving military vehicles freely in their own country while they are banned.
He says:"I remember after the war driving down the drive and seeing this house with these great big lamps on either side which were shining in the dark.
Instead, he saw out the war driving lorries around Gloucestershire for the war effort.
I've read about lots of accidents happening during the blackout when people were driving around bumping into each other, but I've never seen anything about people spending the war driving around and around trying to find their way home.
It is an area of developing technology to detect and protect personal computers and business computer networks from assaults such as war driving, computer corruption, unwanted portal entry and Trojans, among other dangers.
Companies recognize the importance of protecting their networks from hacker attacks and war driving, but oftentimes lack the means with which to ensure network safety," said Thomas Wagg, president of Integralis.
Them are new sections on spyware, hacktivism, war driving, RootKits, cyberterrorism, and firewalls and intrusion detection.