What Is a Back Door Listing?

Backdoor programs generally refer to those program methods that bypass security controls and gain access to a program or system. During the software development phase, programmers often create backdoors within the software so that they can modify defects in the program design. However, if these backdoors are known by others, or if the backdoor is not removed before the software is released, then it becomes a security risk and it is easy for hackers to attack as a vulnerability.

Backdoor

Backdoor programs generally refer to those program methods that bypass security controls and gain access to a program or system. During the software development phase, programmers often create backdoors within the software so that they can modify defects in the program design. However, if these backdoors are known by others, or if the backdoor is not removed before the software is released, then it becomes a security risk and it is easy for hackers to attack as a vulnerability.
Chinese name
Backdoor
Foreign name
backdoor
Belong to
Those that bypass security controls
Include
Easy to be
A backdoor program is a way to stay in a computer system for a particular user to control the computer system in a special way. [1]
There are many types of backdoors from simple to fancy. A simple backdoor may simply create a new account or take over a rarely used account; a complex backdoor (including a Trojan) may bypass the system's security authentication and have secure access to the system. For example, a login program, when you enter a specific password, you can access the system with administrator rights.
Backdoors can be interconnected, and this technique is used by many hackers. For example, a hacker may use a password to crack one or more account passwords, and a hacker may establish one or more accounts. A hacker can access the system. The hacker may use some technology or exploit a vulnerability in the system to
Backdoors can be classified in many ways. Natural classifications differ according to different standards. In order to facilitate understanding, we consider the classification method of backdoors from a technical perspective:
Windows Update
The most famous backdoor program is Microsoft's Windows Update. The action of Windows Update is nothing more than the following three: automatically connect to Microsoft's website when booting, report the status of the computer to the website for processing, the website notifies users through the Windows Update program if there are files that must be updated, and how to update . If we analyze these actions, the action of Automatically connect to Microsoft website when booting is latent in the characteristics of the backdoor program, and the action of reporting the status of the computer is collecting information. Therefore, although Microsoft "swears out" that it will not collect information from personal computers, if we analyze it from Windows Update, we will find that it must collect information from personal computers in order to operate, the poor only collected What information is it.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?