Player makes a late hand that he wasn't originally drawing to.
A deliberately planned security breach in a program. Back doors allow special access to a computer or program. Sometimes back doors can be exploited and allow a cracker unauthorized access to data.
Communicating door of a narrowboat, between cabin and hold or cargo space.
Behind a vehicle. "You're at my back door" or "I'll cover the back door." Used on highways to establish relative position. Also the designation of the station at the rear of a highway caravan of trucks watching for Smokies coming up behind. See also "Front Door" and "Rocking Chair."
Three cards to a flush or straight after five cards have been dealt.
Some programs have back doors, whereby special access to built in features may be accessed.
Making your hand, usually a flush or straight, with both the turn and river cards.
A hole in the security of a computer system deliberately left in place by designers or maintainers. Synonymous with trap door; a hidden software or hardware mechanism used to circumvent security controls.
a secret or underhand means of access (to a place or a position); "he got his job through the back door"
an undocumented way of accessing a system, bypassing the normal authentication mechanisms
a way for someone to circumvent the usual security of a computer system and gain access, perhaps even control, without the legitimate user(s) of the system even knowing
In Texas Hold'em, a back door is when a hand is made using the turn and river cards. In other words if you have two clubs in the hole and one club falls on the flop, you must hit a club on the turn and river to make your flush.
'He hit a back door flush': When a player makes a hand that he was aiming to get. For example if a player hits two hearts in a row with one on the board and he was aiming for a straight then this is called a back door flush.
To Backdoor into a hand is to create a hand other than the one intended such as making a straight instead of the intended flush.
A loophole in a computer's security systems that allows a hacker access to it.
an element in a system that allows access by bypassing access controls
A back door is the name given to a 'secret' access route into the system. Such routes are usually undocumented and almost certainly were not originally specified. In fact, usually only the original developer would be aware of the back door(s) to their system. So why design a back door? Some boffin programmers, suspected that the end users would, at some point, make such a mess of the system, that normal ID and password routines would not allow access, and that another route into the system (known only to the programmers) would be required - the back door. In this particular context the existence of a Back Door can be a useful feature but, it does represent a significant risk in that a person - not necessarily on the staff of the organisation - could be in a position to penetrate the system with malicious intent without the organisation's knowledge. It is reasonable to assume that a programmer with sufficient skill to build the system in the first place will also have the skills necessary to penetrate the system and withdraw again without leaving any evidence of the incursion.
A program feature, which allows its designer special privileges that are not available to the normal users of the program.
a vulnerability intentionally left in the security of a computer system or its software by its designers
An entry point to a program or a system that is hidden or disguised, it may be created by the software's author for maintenance. A certain sequence of control characters permits access to the system manager account. If the back door becomes known, unauthorised users (or malicious software) can gain entry and cause damage. See Backdoor Trojan.
A flaw or bug in a program or system that allows undetected and unwanted access.
When there are two cards to come a player needing both cards to hit to make a flush or a straight is said to have a "back door flush draw" or a "back door straight draw".
is any channel crackers can use to access your system. As a rule, it is easy for a skilled cracker to locate a back door on a computer if its software programs insufficiently protect the computer.
When a player makes a hand he wasn’t intending on getting.
a hidden way to access computer system functions while bypassing system security policy. Back doors may be established illicitly, or sometimes for authorized maintenance purposes.
Back doors are hidden software tools, often created by software writers. These can be exploited by third parties to bypass security controls allowing unauthorised access to system data.
A back door draw is one that requires the player to hit two successive cards to make. For instance, in Texas Holdem, if a player holds A9, and the board is 478, then he has a back door straight draw (the 789 can hit two cards to make a straight). For straights, some back door draws are easier to make than others (789 offers more outs than 458).
A feature built into a program by its designer, which allows the designer special privileges that are denied to the normal users of the program. A back door in a logon program, for instance, could enable the designer to log on to a system, even though he or she did not have an authorized account on that system.
A hand that is made by using the last two cards dealt.
Hand made on the last two cards.
A feature intentionally built into a program by its designer which allows them to gain full or partial access to your system.
Vulnerable point in a system or application which allows potential intruders to bypass normal security features. Sometimes even placed intentionally in programs by programmers. 'Back door' is also used to mean the access to encrypted data provided to law enforcement officials by giving them copies of keys held in escrow. This practice is contested by a number of privacy initiatives. See ' Key escrow'. _____________________________________________________________________________
A hand made using the last two cards dealt in seven card stud or Texas Hold'em (e.g. 'a back door flush').
an alternative way of gaining access to a computer system. A back door entry might be a programmed secret access into the system unknown to routine users of the system.
A hand where both the Turn Card and the River Card are used to make the hand.
Three cards to a straight or a flush. For example, in Hold'em, if you have two clubs and one club comes on the flop, you have a back door flush draw.
Making a hand that the player wasn't drawing at.
A "hole" in the security of a system which was deliberately left in place by designers or maintenance personnel, thus allowing privileged access by these people. [] Synonymous with TRAP DOOR and WORMHOLE. NOTE: A BACK DOOR, of course, is a vulnerability subject to discovery by HACKERS and CRACKERS with danger of exploitation by the latter.
Hidden software or hardware mechanism used to circumvent security controls. Synonymous with trap door.
Privileged access by authorized system analysts or by the authors of such a privilege into a security system on the Web. Clearly, breaking the code that allows entrance into the back door is always a goal hackers pursue.
a means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a back door so that the program can be accessed...
To back door a flush or straight is when the last two cards make a player's hand, even though this was not the original hand the player was drawing to
Also known as runner runner this is when in holdem or omaha you catch the turn and river to make your hand. For example you have Ah 5h and you get a flop Kh Jc 5c, if the turn and river are both hearts you have made a backdoor flush.
A hand-made Back Door is made using both of the last two cards, as in Seven Card Stud or Texas Hold'em.
Hand made in the last two cards.
To make a good hand by 'accident' whilst trying for a different one. For example, a back door flush.
A draw that requires both the turn and river cards to make your hand. Eg. Both cards are diamonds to make your diamond flush.
A hole in the security of a system deliberately left in place by designers or maintainers. This could be for sinister reasons (e.g. to allow the designer to easily crack the security at a later date) or legitimate ones (e.g. to allow service technicians easy access). A back door can also be created after the fact by a cracker, for later use. A Trojan horse usually serves as a back door into a system.
(Context: computer security) A secret point of access on a system or in a program. Normally describes a secret point of entry into an operating system installed by a trojan horse program or a hacker.
After the flop, you need two particular cards to complete your hand and you get them. These two are also referred to as “runner runner.
Where a developer deliberately includes undocumented commands that gives him or her unauthorised access to the system.
A draw requiring both the turn and the river cards to hit.
Making a hand other than the one intended.
An alternate, usually secret, method to decrypt an encrypted file or message. This method is usually only known to a few people, such as the author of the program. The presence of a back door greatly reduces the reliability of the implementation of an encryption algorithm.
A feature programmers often build into programs to allow special privileges normally denied to users of the program. Often programmers build back doors so they can fix bugs or for use by service technicians. If hackers or others learn about a back door, the feature may pose a security risk.
A hand made using the last two cards dealt in a game of Seven Card Stud, Omaha, or Texas Hold Em Poker.
A hand which is made using the last two cards. Making a back door hand is often unintentional.
A hand-made 'back door' is one made using both of the last two cards. A back door flush in Texas hold 'em is about 20-1.
A method of circumventing an enterprise security policy through an unknown vulnerability, allowing an illegal user access to the network. An example of “backdoor†would be an insecure modem connection to a computer on the network, that circumvents all security measures.
1. Program that creates a way to access a computer system in a clandestine manner, usually without the system owner's knowledge and typically over a network such as the Internet. Such programs are often used by crackers(hackers) to allow easy access to a machine once it's been compromised (hacked). 2. On the less nefarious side programmers will sometimes create a backdoor in a program for various legitimate reasons.
Back Door was a jazz-rock trio, formed c. 1971, which featured bass player, Colin Hodgkinson, as its front man, Ron Asprey on saxes and Tony Hicks on drums, who was substituted later by Adrian Tilbrook. Hodgkinson made an innovative use of the electric bass, making it a lead instrument rather than a part of a rhythm section.