A backdoor is a program through which unauthorized programmers can obtain access to secure areas of your system. Once the security has been bypassed, these programs can make changes to the operating system and the registry. Backdoors often are associated with Trojan horses. Hackers will place backdoors to gain re-entry easily after their initial attack.
method of taking control of a program or computer.
a built-in way of communicating with a program whose existence a typical user does not expect
a feature built into a program by its designer
a hidden access point to a computer that bypasses the normal login procedure
a hidden way for a user to access a compromised system for malicious purposes or a programmer leaving a means to access a system for recovery or troubleshooting
a malicious program designed to accept incoming communications to your computer, allowing an attacker to access your files and confidential information without your knowledge
a means of access to a computer program that bypasses any computer security mechanisms
a means of by-passing a system's normal security for keeping unauthorized users out
a mechanism surreptitiously introduced into a computer system to facilitate unauthorized access to the system
a method of bypassing normal authentication to gain access to a computer without the PC user knowing
an alternative means of entry that bypasses the normal restrictions
an undocumented or secret means that can be used to obtain unauthorized access to your computer, or a malicious program that uses such a means to penetrate a computer system
a piece of software that allows access to the computer system bypassing the normal authentication procedures
a point of entry into your computer either through software or hardware and gives partial or complete remote access to someone through the Internet
a potential security risk as it can be exploited by hackers
a program or a set of related programs that a hacker installs on the victim computer to allow access to the system at a later time
a program that can get into computers without user realizing, passing itself off as a harmless program
a program that is designed to hide itself inside a target host
a remote control program used by a hacker to take control of your computer
a secret method for obtaining remote access to a computer
a secret or unauthorized channel for accessing computer system
a secret or undocumented means of getting into a computer system
a secret way of controlling a piece of software
a secret way to gain access to a server, other than via the usual method
a simple program that allows the attacker to secretly gain access to the company's network, even if the credentials given to them by their employer to access the network have been revoked
a software feature (often undocumented) that bypasses the normal security mechanisms
a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place
A nonstandard or secret way to access a system or application. A program that grants access to a system that bypasses established security authentication.
secret passage through the security built into logiciel usually by the programmer(s) who wrote it ( language=modern cyber-slang); sometimes, when a program's security, as required by customer and/or specification, takes time and/or keystrokes, the programmers writing the code will build in a backdoor to make it easier and faster for them to run the program, like for testing. Used as a verb: to write such a backdoor; also, a way around the limitations of Einsteinian physics — see Backdoor Planets
A way to bypass the normal login security and gain control of a computer without necessarily obtaining the owner's consent. If a backdoor is installed on a network-attached computer, a person anywhere on the Internet may be able to gain control of the computer without your knowledge or approval. A backdoor need not have malicious intent; e.g. operating systems are sometimes shipped by the manufacturer with privileged accounts for use by field service technicians or the vendor's maintenance programmers. However, they may also be used for intrusion by unauthorized persons. Also known as a "trap door".
A piece of software that allows access to a computer without using the conventional security procedures (e.g. without knowledge of the user's password and user name). These programs are often Trojans.
harmful software that allows hackers inside your computer
An opening that programmers sometimes build into a program to allow them to update the program, fix bugs or monitor problems or usage. Backdoors can create serious security issues depending on the capabilities of the backdoor and if they are discovered and exploited by malicious people.
Also called a trapdoor. An undocumented way of gaining access to a program, online service or an entire computer system. The backdoor is written by the programmer who creates the code for the program. It is often only known by the programmer. A backdoor is a potential security risk.
A program which allows an unauthorized user to have access to a victim's computer. This is considered a hacker tool used to maintain control of a victim's computer.
Software installed without permission after a system is compromised; allows the attacker to access a compromised computer while easily avoiding security mechanisms.
A security hole that is designed to allow someone to connect to your computer and control it. Can be installed by a legitimate program's author, or by malware.
A program that provides hidden access to your computer.
a means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a back door so that the program can be accessed...
Programs including this feature allow malicious users to gain full access to remote systems.
An undocumented method of gaining entrance to a computer system. These are often placed in networks by programmers for easy troubleshooting, but hackers are especially good at sniffing them out.
An undocumented way of gaining access to a program, a computer system or network. The backdoor is usually implemented by the creator of the program, and is usually only known to him. A backdoor is a potential security risk.
A Backdoor is a program that enters the computer and creates a backdoor through which it is possible to control the affected system without the user noticing. A very popular tool with hackers
Programs that give an attacker access to and remote control of another computer. Backdoors are largely Trojans dealt with by most anti-virus products. NIPS (Network Intrusion Prevention System) helps detect and block backdoor communications.
A backdoor is a secret or invisible entry point that allows access to a computer system without the use of authentication.
This is the way a hacker enters a computer system even after all other security holes have been closed.
Backdoor is a name for a trojan horse program which opens security vulnerabilities to the system when executed.
A means of disabling a system's security which is deliberately left by designers of the system, often to give access to service technicians or maintenance programmers.