The process used by operators when they enter the information twice or when two separate operators enter the data at separate times. The two entries are then compared with each other to ensure that they match. This process is used in military and banking applications to detect intended falsification of information. Graham, R. Hacking Lexicon. [Online, 2001.] Robert Graham Website. http://www.linuxsecurity.com/resource_files/documentation/hacking-dict.html.