A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology). Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.
A backdoor may take the form of a hidden part of a program, a separate program (e.g. Back Orifice may subvert the system through a rootkit), code in the firmware of the hardware, or parts of an operating system such as Windows. Trojan horses can be used to create vulnerabilities in a device. A Trojan horse may appear to be an entirely legitimate program, but when executed, it triggers an activity that may install a backdoor. Although some are secretly installed, other backdoors are deliberate and widely known. These kinds of backdoors have "legitimate" uses such as providing the manufacturer with a way to restore user passwords.
Many systems that store information within the cloud fail to create accurate security measures. If many systems are connected within the cloud, häçkers can gain access to all other platforms through the most vulnerable system.Default passwords (or other default credentials) can function as backdoors if they are not changed by the user. Some debugging features can also act as backdoors if they are not removed in the release version.In 1993, the United States government attempted to deploy an encryption system, the Clipper chip, with an explicit backdoor for law enforcement and national security access. The chip was unsuccessful.

You do not have permission to view the full content of this post. Log in or register now.
  1. L

    Tutorial RAT(Remote Access Trojan) Information And Demo

    What Is Rat? -A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment. Once the host system is...
  2. X

    Help TOTOO BA?

    Totoo po ba na kaya banned sa ibang bansa ang Huawei phones kasi nakukuha nila ang personal data natin o na baback door nila ang phone? Salamat po sa mga sasagot. Kaya ko po na tanong kasi nag babalak po ako bumili ng Huawei phone :) Newbie here.!
  3. K

    Closed Proxy server for globe

    dretsohan na pwde to sa VPN para pangdota at ssh for s†rêâmïng purposes reminder : DEFAULT APN with promo di ko pa ntry sa MGC masyadong mahina ang speed.. more proxies later.. I have a meeting.. sa mga nag PM.. sorry po busy ako para sa mga PM.. become an established member para makita mo...
  4. T

    Closed How to upgrade to windows 10 after july 29 free upgrade has ended.

    Everyone thinks July 29 is the last day you can switch to Windows 10 for free. Well, Think again. o_O Yes! You can still upgrade! :) and we have 3 ways to do this . . . . Plan A : Tweaking the system clock/date. Revert you system clock/date back to July 28, this will re-enable the windows...
  5. D

    Closed paano malaman kung my palaman ang tool na gamit.

    gumamit ng .net reflector drag and drop lang tapos malalaman mo na kung my keylog or backdoor check mo lang kung my kahinahinalang email add or SMTP. nabasa ko lang to sa isang blog (regrads sa gumawa ng blog walang name eh, thank you) nag try ako at bingo kaya pala ang mga mac na na scan ko...