A computer system that was compromized in a way that the attacker gained unauthorized "root," or total control over the target system is "rooted."