Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Backdoor (computing)

Index Backdoor (computing)

A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device (e.g. a home router), or its embodiment, e.g. as part of a cryptosystem, an algorithm, a chipset, or a "homunculus computer" (such as that as found in Intel's AMT technology). [1]

100 relations: Algorithm, Android (operating system), Artificial intelligence, Authentication, Back Orifice, Backdoor.Win32.Seed, Backdoor:Win32.Hupigon, BBN Technologies, Black box, Booting, Borland, Broadband, C (programming language), CERT Coordination Center, Chipset, Clipper chip, Cloak and dagger, Communications of the ACM, Compiler, Computer, Computer virus, Computer worm, Control (management), Copyright infringement, Cryptographically secure pseudorandom number generator, Cryptosystem, Cryptovirology, Cult of the Dead Cow, DARPA, Debugging, Default password, Digital rights management, Disassembler, Division of labour, Dual EC DRBG, Easter egg (media), Electronic Frontier Foundation, Email, Email spam, George Mason University, GNU Compiler Collection, Hard coding, Hardware backdoor, IBM PC compatible, Intel Active Management Technology, Intel C++ Compiler, InterBase, JavaScript, Joomla, Juniper Networks, ..., Ken Thompson, Kleptography, Linux kernel, Login, Machine code, Microsoft BackOffice Server, Microsoft Outlook, Microsoft Windows, Moti Yung, Multics, Mydoom, National Security Agency, Obfuscation (software), Object code, Object Pascal, Operating system, Patch (computing), Photomask, PL/I, Plaintext, Plausible deniability, Plug-in (computing), Proof of concept, Proprietary software, Public-key cryptography, RAND Corporation, Residential gateway, Retrovirus, Reverse engineering, Rootkit, Samsung, ScreenOS, Security hacker, Smart card, Sobig, Software, Software agent, Sony BMG copy protection rootkit scandal, Source code, Superuser, System administrator, Trapdoor function, Trojan horse (computing), Turing Award, United States Air Force, Unix, Version control, WarGames, WordPress, 1983 in film. Expand index (50 more) »

Algorithm

In mathematics and computer science, an algorithm is an unambiguous specification of how to solve a class of problems.

New!!: Backdoor (computing) and Algorithm · See more »

Android (operating system)

Android is a mobile operating system developed by Google, based on a modified version of the Linux kernel and other open source software and designed primarily for touchscreen mobile devices such as smartphones and tablets.

New!!: Backdoor (computing) and Android (operating system) · See more »

Artificial intelligence

Artificial intelligence (AI, also machine intelligence, MI) is intelligence demonstrated by machines, in contrast to the natural intelligence (NI) displayed by humans and other animals.

New!!: Backdoor (computing) and Artificial intelligence · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Backdoor (computing) and Authentication · See more »

Back Orifice

Back Orifice (often shortened to BO) is a computer program designed for remote system administration.

New!!: Backdoor (computing) and Back Orifice · See more »

Backdoor.Win32.Seed

Backdoor.Win32.Seed is the definition of a backdoor Trojan.

New!!: Backdoor (computing) and Backdoor.Win32.Seed · See more »

Backdoor:Win32.Hupigon

Backdoor.Win32.Hupigon (also Backdoor.Win32.Graftor) is a backdoor Trojan.

New!!: Backdoor (computing) and Backdoor:Win32.Hupigon · See more »

BBN Technologies

BBN Technologies (originally Bolt, Beranek and Newman) is an American high-technology company which provides research and development services.

New!!: Backdoor (computing) and BBN Technologies · See more »

Black box

In science, computing, and engineering, a black box is a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings.

New!!: Backdoor (computing) and Black box · See more »

Booting

In computing, booting is starting up a computer or computer appliance until it can be used.

New!!: Backdoor (computing) and Booting · See more »

Borland

Borland Software Corporation is a software company that facilitates software deployment projects.

New!!: Backdoor (computing) and Borland · See more »

Broadband

In telecommunications, broadband is wide bandwidth data transmission which transports multiple signals and traffic types.

New!!: Backdoor (computing) and Broadband · See more »

C (programming language)

C (as in the letter ''c'') is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations.

New!!: Backdoor (computing) and C (programming language) · See more »

CERT Coordination Center

The CERT Coordination Center (CERT/CC) is the coordination center of the computer emergency response team (CERT) for the Software Engineering Institute (SEI), a non-profit United States federally funded research and development center.

New!!: Backdoor (computing) and CERT Coordination Center · See more »

Chipset

In a computer system, a chipset is a set of electronic components in an integrated circuit known as a "Data Flow Management System" that manages the data flow between the processor, memory and peripherals.

New!!: Backdoor (computing) and Chipset · See more »

Clipper chip

The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured “voice and data messages" with a built-in backdoor.

New!!: Backdoor (computing) and Clipper chip · See more »

Cloak and dagger

"Cloak and dagger" refers to situations involving intrigue, secrecy, espionage, or mystery.

New!!: Backdoor (computing) and Cloak and dagger · See more »

Communications of the ACM

Communications of the ACM is the monthly journal of the Association for Computing Machinery (ACM).

New!!: Backdoor (computing) and Communications of the ACM · See more »

Compiler

A compiler is computer software that transforms computer code written in one programming language (the source language) into another programming language (the target language).

New!!: Backdoor (computing) and Compiler · See more »

Computer

A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming.

New!!: Backdoor (computing) and Computer · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Backdoor (computing) and Computer virus · See more »

Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

New!!: Backdoor (computing) and Computer worm · See more »

Control (management)

Control, or controlling, is one of the managerial functions like planning, organizing, staffing and directing.

New!!: Backdoor (computing) and Control (management) · See more »

Copyright infringement

Copyright infringement is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.

New!!: Backdoor (computing) and Copyright infringement · See more »

Cryptographically secure pseudorandom number generator

A cryptographically secure pseudo-random number generator (CSPRNG) or cryptographic pseudo-random number generator (CPRNG) is a pseudo-random number generator (PRNG) with properties that make it suitable for use in cryptography.

New!!: Backdoor (computing) and Cryptographically secure pseudorandom number generator · See more »

Cryptosystem

In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption).

New!!: Backdoor (computing) and Cryptosystem · See more »

Cryptovirology

Cryptovirology is a field that studies how to use cryptography to design powerful malicious software.

New!!: Backdoor (computing) and Cryptovirology · See more »

Cult of the Dead Cow

Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organization founded in 1984 in Lubbock, Texas.

New!!: Backdoor (computing) and Cult of the Dead Cow · See more »

DARPA

The Defense Advanced Research Projects Agency (DARPA) is an agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military.

New!!: Backdoor (computing) and DARPA · See more »

Debugging

Debugging is the process of finding and resolving defects or problems within a computer program that prevent correct operation of computer software or a system.

New!!: Backdoor (computing) and Debugging · See more »

Default password

Where a device needs a username and/or password to log in, a default password is usually provided that allows the device to be accessed during its initial setup, or after resetting to factory defaults.

New!!: Backdoor (computing) and Default password · See more »

Digital rights management

Digital rights management (DRM) is a set of access control technologies for restricting the use of proprietary hardware and copyrighted works.

New!!: Backdoor (computing) and Digital rights management · See more »

Disassembler

A disassembler is a computer program that translates machine language into assembly language—the inverse operation to that of an assembler.

New!!: Backdoor (computing) and Disassembler · See more »

Division of labour

The division of labour is the separation of tasks in any system so that participants may specialize.

New!!: Backdoor (computing) and Division of labour · See more »

Dual EC DRBG

Dual_EC_DRBG (Dual Elliptic Curve Deterministic Random Bit Generator) is an algorithm that was presented as a cryptographically secure pseudorandom number generator (CSPRNG) using methods in elliptic curve cryptography.

New!!: Backdoor (computing) and Dual EC DRBG · See more »

Easter egg (media)

In computer software and media, an Easter egg is an intentional inside joke, hidden message or image, or secret feature of a work.

New!!: Backdoor (computing) and Easter egg (media) · See more »

Electronic Frontier Foundation

The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California.

New!!: Backdoor (computing) and Electronic Frontier Foundation · See more »

Email

Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices.

New!!: Backdoor (computing) and Email · See more »

Email spam

Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.

New!!: Backdoor (computing) and Email spam · See more »

George Mason University

George Mason University (GMU, Mason, or George Mason) is a public research university in Fairfax County, Virginia.

New!!: Backdoor (computing) and George Mason University · See more »

GNU Compiler Collection

The GNU Compiler Collection (GCC) is a compiler system produced by the GNU Project supporting various programming languages.

New!!: Backdoor (computing) and GNU Compiler Collection · See more »

Hard coding

Hard coding (also hard-coding or hardcoding) is the software development practice of embedding data directly into the source code of a program or other executable object, as opposed to obtaining the data from external sources or generating it at run-time.

New!!: Backdoor (computing) and Hard coding · See more »

Hardware backdoor

Hardware backdoors are backdoors in hardware.

New!!: Backdoor (computing) and Hardware backdoor · See more »

IBM PC compatible

IBM PC compatible computers are computers similar to the original IBM PC, XT, and AT, able to use the same software and expansion cards.

New!!: Backdoor (computing) and IBM PC compatible · See more »

Intel Active Management Technology

Intel Active Management Technology (AMT) is hardware and firmware technology for remote out-of-band management of personal computers, in order to monitor, maintain, update, upgrade, and repair them.

New!!: Backdoor (computing) and Intel Active Management Technology · See more »

Intel C++ Compiler

Intel C++ Compiler, also known as icc or icl, is a group of C and C++ compilers from Intel available for Windows, Mac, Linux, FreeBSD and Intel-based Android devices.

New!!: Backdoor (computing) and Intel C++ Compiler · See more »

InterBase

InterBase is a relational database management system (RDBMS) currently developed and marketed by Embarcadero Technologies.

New!!: Backdoor (computing) and InterBase · See more »

JavaScript

JavaScript, often abbreviated as JS, is a high-level, interpreted programming language.

New!!: Backdoor (computing) and JavaScript · See more »

Joomla

Joomla! is a free and open-source content management system (CMS) for publishing web content, developed by Open Source Matters, Inc.

New!!: Backdoor (computing) and Joomla · See more »

Juniper Networks

Juniper Networks, Inc. is an American multinational corporation headquartered in Sunnyvale, California that develops and markets networking products.

New!!: Backdoor (computing) and Juniper Networks · See more »

Ken Thompson

Kenneth Lane "Ken" Thompson (born February 4, 1943), commonly referred to as ken in hacker circles, is an American pioneer of computer science.

New!!: Backdoor (computing) and Ken Thompson · See more »

Kleptography

Kleptography is the study of stealing information securely and subliminally and it was introduced by Adam Young and Moti Yung in the Proceedings of Advances in Cryptology—Crypto '96.

New!!: Backdoor (computing) and Kleptography · See more »

Linux kernel

The Linux kernel is an open-source monolithic Unix-like computer operating system kernel.

New!!: Backdoor (computing) and Linux kernel · See more »

Login

In computer security, logging in (or logging on or signing in or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves.

New!!: Backdoor (computing) and Login · See more »

Machine code

Machine code is a computer program written in machine language instructions that can be executed directly by a computer's central processing unit (CPU).

New!!: Backdoor (computing) and Machine code · See more »

Microsoft BackOffice Server

Microsoft BackOffice Server is a discontinued computer software package featuring Windows NT Server and other Microsoft server products that ran on NT Server.

New!!: Backdoor (computing) and Microsoft BackOffice Server · See more »

Microsoft Outlook

Microsoft Outlook is a personal information manager from Microsoft, available as a part of the Microsoft Office suite.

New!!: Backdoor (computing) and Microsoft Outlook · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: Backdoor (computing) and Microsoft Windows · See more »

Moti Yung

Mordechai M. (Moti) Yung is an Israeli-American cryptographer and computer scientist with an extensive industrial research career.

New!!: Backdoor (computing) and Moti Yung · See more »

Multics

Multics (Multiplexed Information and Computing Service) is an influential early time-sharing operating system, based around the concept of a single-level memory.

New!!: Backdoor (computing) and Multics · See more »

Mydoom

Mydoom, also known as W32.MyDoom@mm, Novarg, Mimail.R and "'Shimgapi'", is a computer worm affecting Microsoft Windows.

New!!: Backdoor (computing) and Mydoom · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: Backdoor (computing) and National Security Agency · See more »

Obfuscation (software)

In software development, obfuscation is the deliberate act of creating source or machine code that is difficult for humans to understand.

New!!: Backdoor (computing) and Obfuscation (software) · See more »

Object code

In computing, object code or object module is the product of a compiler.

New!!: Backdoor (computing) and Object code · See more »

Object Pascal

Object Pascal refers to a branch of object-oriented derivatives of Pascal, mostly known as the primary programming language of Delphi.

New!!: Backdoor (computing) and Object Pascal · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Backdoor (computing) and Operating system · See more »

Patch (computing)

A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it.

New!!: Backdoor (computing) and Patch (computing) · See more »

Photomask

A photomask is an opaque plate with holes or transparencies that allow light to shine through in a defined pattern.

New!!: Backdoor (computing) and Photomask · See more »

PL/I

PL/I (Programming Language One, pronounced) is a procedural, imperative computer programming language designed for scientific, engineering, business and system programming uses.

New!!: Backdoor (computing) and PL/I · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: Backdoor (computing) and Plaintext · See more »

Plausible deniability

Plausible deniability is the ability of people (typically senior officials in a formal or informal chain of command) to deny knowledge of or responsibility for any damnable actions committed by others in an organizational hierarchy because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions.

New!!: Backdoor (computing) and Plausible deniability · See more »

Plug-in (computing)

In computing, a plug-in (or plugin, add-in, addin, add-on, addon, or extension) is a software component that adds a specific feature to an existing computer program.

New!!: Backdoor (computing) and Plug-in (computing) · See more »

Proof of concept

Proof of concept (PoC) is a realization of a certain method or idea in order to demonstrate its feasibility, or a demonstration in principle with the aim of verifying that some concept or theory has practical potential.

New!!: Backdoor (computing) and Proof of concept · See more »

Proprietary software

Proprietary software is non-free computer software for which the software's publisher or another person retains intellectual property rights—usually copyright of the source code, but sometimes patent rights.

New!!: Backdoor (computing) and Proprietary software · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Backdoor (computing) and Public-key cryptography · See more »

RAND Corporation

RAND Corporation ("Research ANd Development") is an American nonprofit global policy think tank created in 1948 by Douglas Aircraft Company to offer research and analysis to the United States Armed Forces.

New!!: Backdoor (computing) and RAND Corporation · See more »

Residential gateway

In telecommunications networking, a residential gateway (more commonly known as a home router or home gateway) is a device that allows a local area network (LAN) to connect to a wide area network (WAN) via a modem.

New!!: Backdoor (computing) and Residential gateway · See more »

Retrovirus

A retrovirus is a single-stranded positive-sense RNA virus with a DNA intermediate and, as an obligate parasite, targets a host cell.

New!!: Backdoor (computing) and Retrovirus · See more »

Reverse engineering

Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to scientific research, the only difference being that scientific research is about a natural phenomenon.

New!!: Backdoor (computing) and Reverse engineering · See more »

Rootkit

A root kit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

New!!: Backdoor (computing) and Rootkit · See more »

Samsung

Samsung is a South Korean multinational conglomerate headquartered in Samsung Town, Seoul.

New!!: Backdoor (computing) and Samsung · See more »

ScreenOS

ScreenOS is a real-time embedded operating system for the NetScreen range of hardware firewall devices from Juniper Networks.

New!!: Backdoor (computing) and ScreenOS · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: Backdoor (computing) and Security hacker · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.

New!!: Backdoor (computing) and Smart card · See more »

Sobig

The Sobig Worm was a computer worm that infected millions of Internet-connected, Microsoft Windows computers in August 2003.

New!!: Backdoor (computing) and Sobig · See more »

Software

Computer software, or simply software, is a generic term that refers to a collection of data or computer instructions that tell the computer how to work, in contrast to the physical hardware from which the system is built, that actually performs the work.

New!!: Backdoor (computing) and Software · See more »

Software agent

In computer science, a software agent is a computer program that acts for a user or other program in a relationship of agency, which derives from the Latin agere (to do): an agreement to act on one's behalf.

New!!: Backdoor (computing) and Software agent · See more »

Sony BMG copy protection rootkit scandal

A scandal erupted in 2005 regarding Sony BMG's implementation of deceptive, illegal, and harmful copy protection measures on about 22 million CDs.

New!!: Backdoor (computing) and Sony BMG copy protection rootkit scandal · See more »

Source code

In computing, source code is any collection of code, possibly with comments, written using a human-readable programming language, usually as plain text.

New!!: Backdoor (computing) and Source code · See more »

Superuser

In computing, the superuser is a special user account used for system administration.

New!!: Backdoor (computing) and Superuser · See more »

System administrator

A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers.

New!!: Backdoor (computing) and System administrator · See more »

Trapdoor function

A trapdoor function is a function that is easy to compute in one direction, yet difficult to compute in the opposite direction (finding its inverse) without special information, called the "trapdoor".

New!!: Backdoor (computing) and Trapdoor function · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Backdoor (computing) and Trojan horse (computing) · See more »

Turing Award

The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to an individual selected for contributions "of lasting and major technical importance to the computer field".

New!!: Backdoor (computing) and Turing Award · See more »

United States Air Force

The United States Air Force (USAF) is the aerial and space warfare service branch of the United States Armed Forces.

New!!: Backdoor (computing) and United States Air Force · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Backdoor (computing) and Unix · See more »

Version control

A component of software configuration management, version control, also known as revision control or source control, is the management of changes to documents, computer programs, large web sites, and other collections of information.

New!!: Backdoor (computing) and Version control · See more »

WarGames

WarGames is a 1983 American Cold War science fiction film written by Lawrence Lasker and Walter F. Parkes and directed by John Badham.

New!!: Backdoor (computing) and WarGames · See more »

WordPress

WordPress is a free and open-source content management system (CMS) based on PHP and MySQL.

New!!: Backdoor (computing) and WordPress · See more »

1983 in film

The following is an overview of events in 1983 in film, including the highest-grossing films, award ceremonies and festivals, a list of films released and notable deaths.

New!!: Backdoor (computing) and 1983 in film · See more »

Redirects here:

Backdoor (cryptography), Backdoor exploit, Compiler backdoor, Encryption backdoor, Reflections on Trusting Trust, Secure golden key, Thompson hack, Thompson trust hack, Trusting trust, W32/Induc-A.

References

[1] https://en.wikipedia.org/wiki/Backdoor_(computing)

OutgoingIncoming
Hey! We are on Facebook now! »