What Is a Back Door Listing?
Backdoor programs generally refer to those program methods that bypass security controls and gain access to a program or system. During the software development phase, programmers often create backdoors within the software so that they can modify defects in the program design. However, if these backdoors are known by others, or if the backdoor is not removed before the software is released, then it becomes a security risk and it is easy for hackers to attack as a vulnerability.
Backdoor
- Chinese name
- Backdoor
- Foreign name
- backdoor
- Belong to
- Those that bypass security controls
- Include
- Easy to be
- Backdoor programs generally refer to those program methods that bypass security controls and gain access to a program or system. During the software development phase, programmers often create backdoors within the software so that they can modify defects in the program design. However, if these backdoors are known by others, or if the backdoor is not removed before the software is released, then it becomes a security risk and it is easy for hackers to attack as a vulnerability.
- A backdoor program is a way to stay in a computer system for a particular user to control the computer system in a special way. [1]
- There are many types of backdoors from simple to fancy. A simple backdoor may simply create a new account or take over a rarely used account; a complex backdoor (including a Trojan) may bypass the system's security authentication and have secure access to the system. For example, a login program, when you enter a specific password, you can access the system with administrator rights.
- Backdoors can be interconnected, and this technique is used by many hackers. For example, a hacker may use a password to crack one or more account passwords, and a hacker may establish one or more accounts. A hacker can access the system. The hacker may use some technology or exploit a vulnerability in the system to
- Backdoors can be classified in many ways. Natural classifications differ according to different standards. In order to facilitate understanding, we consider the classification method of backdoors from a technical perspective:
- Windows Update