See also: Thief | Malicious code
A process in which something which the owner prefers to be or remain secret changed ownership or got obtained. E.g. information (a password, secret document, phone number), a service (the control over a computer, a government) or a material property (a car, plane). Hijacking is not necessarily illegal.
Protocols can be targets for attempts at takeovers, or control of. This hijacking is considered unethical and is often detrimental to a computer users benefit. Standards are sometimes the target of malicious companies using the ’embrace & extend’ strategy.
Network resources are easy to hijack with malicious code. Hosts files can also be hijacked by spyware, see Getting Rid Of Spyware. IRC and Internet Explorer can be easily hijacked. Autodialer programs hijack modems, running up expensive phone bills.
TakeDown.NET -> “Hijack”