Actions

  Print Article
  BookMark Article

Categories    Category List

Arts & Humanities
  Books & Authors
  Dancing
  Genealogy
  History
  Performing Arts
  Philosophy
  Poetry
  Theater & Acting
  Visual Arts
Beauty & Style
  Fashion & Accessories
  Hair
  Makeup
  Skin & Body
Business & Finance
  Advertising & Marketing
  Careers & Employment
  Corporations
  Credit
  Insurance
  Investing
  Personal Finance
  Renting & Real Estate
  Small Business
  Taxes
Cars & Transportation
  Aircraft
  Boats & Boating
  Car
  Insurance & Registration
  Maintenance & Repairs
  Motorcycles
  Rail
Computers & Internet
  Computer Networking
  Hardware
  Internet
  Programming & Design
  Security
  Software
Consumer Electronics
  Camcorders
  Cameras
  Cell Phones & Plans
  Games & Gear
  Home Theater
  Music & Music Players
  PDAs & Handhelds
  TVs
Dining Out
Education & Reference
  Financial Aid
  Higher Education
  Preschool
  Primary & Secondary Education
  Special Education
  Studying Abroad
  Teaching
Entertainment & Music
  Celebrities
  Comics & Animation
  Horoscopes
  Jokes & Riddles
  Magazines
  Movies
  Music
  Polls & Surveys
  Radio
  Television
Environment
  Alternative Fuel Vehicles
  Conservation
  Global Warming
  Green Living
Family & Relationships
  Family
  Friends
  Marriage & Divorce
  Singles & Dating
  Weddings
Food & Drink
  Beer, Wine & Spirits
  Cooking & Recipes
  Ethnic Cuisine
  Vegetarian & Vegan
Games & Recreation
  Amusement Parks
  Board Games
  Card Games
  Gambling
  Hobbies & Crafts
  Toys
  Video & Online Games
Health
  Alternative Medicine
  Dental
  Diet & Fitness
  Diseases & Conditions
  General Health Care
  Men's Health
  Mental Health
  Optical
  Women's Health
Home & Garden
  Cleaning & Laundry
  Decorating & Remodeling
  Do It Yourself (DIY)
  Garden & Landscape
  Maintenance & Repairs
Local Businesses
News & Events
  Current Events
  Media & Journalism
Pets
Politics & Government
  Civic Participation
  Elections
  Embassies & Consulates
  Government
  Immigration
  International Organizations
  Law & Ethics
  Military
  Politics
Pregnancy & Parenting
  Adolescent
  Adoption
  Baby Names
  Newborn & Baby
  Parenting
  Pregnancy
  Toddler & Preschooler
  Trying to Conceive
Science & Mathematics
  Agriculture
  Astronomy & Space
  Biology
  Botany
  Chemistry
  Earth Sciences & Geology
  Engineering
  Geography
  Mathematics
  Medicine
  Physics
  Weather
  Zoology
Social Science
  Anthropology
  Dream Interpretation
  Economics
  Gender Studies
  Psychology
  Sociology
Society & Culture
  Community Service
  Cultures & Groups
  Etiquette
  Holidays
  Languages
  Mythology & Folklore
  Religion & Spirituality
  Royalty
Sports
Travel

Online Now    Online Now

Author Login    Author Login

Welcome Guest! Please login or create an account.

Username:

Password:



Navigation    Navigation

ADS    Featured Author

ad

ADSDisclosure

In computers what is considered a back door ?

Author :

Submitted : 2018-06-15 15:16:48    Popularity:     

Tags: computers  considered  door  

Any kind of undocumented method of accessing a program or a computer that was intentionally put there by the developer or software company. Not all backdo

Answers:

Any kind of undocumented method of accessing a program or a computer that was intentionally put there by the developer or software company.

Not all backdoors are put in for breaching security, mind you. Many companies will put a backdoor into a product to help with debugging. Unfortunately a common problem is that the company forgets to disable or remove the backdoor, and then information about its existence leaks out.

It's when somebody who designs a secure system with restricted access leaves a way to get into the system only they know about.
That's why people prefer open source software: you can't hide a backdoor if everybody can see the source code.

A back door is an undisclosed way of accessing a computer's operating system, an account on the computer or accessing data that has been included by the software manufacturer to allow access for legitimate or nefarious reasons.

A company might include a back door in their software to allow them to offer better customer support or to gain access to a computer when the account password is not known. Other companies may use include back doors to allow access to the computer to gather data illegally without the computer owner being aware of it.

A back door should be differentiated from a Trojan or spyware. These are pieces of software that the computer has contracted by accessing an unsafe website or opening an infected email. These infections tend to be random as it depends on what the computer user has accessed and not what software in installed.

A back door should also be differentiated from the data gathering that recent versions of Windows and several other software packages incorporate ostensibly to help the software house improve their products. For example, Windows 10 defaults to providing information that can help them provide targeted advertising to a PC and also tell them what things users do with their PCs. This is not a back door, but it can be a form of legal spying.

To summarise, a back door facility is a secret way that a software developer has for gaining access to a computer or program.

An unsecured port.

Watch the movie War Games with Matthew Broderick, In it he finds a password for a backend "Joshua" is the word. He finds the backdoor to star the movie.

In computer parlance, a "back door" is similar to a "work around," meaning an alternate means of accessing a particular system, function or data...but with the added implication that the "alternate method" also involves circumventing established policy and/or security measures.

It basically allows someone to access the computer with or without permission. Let’s say you work for a company and your computer doesn’t work. You call IT and they can fix it remotely by using a backfiring to access your computer.

entry through an open port or rouge software

it is how the NSA is monitoring us right now .


obey

Typically it's an undocumented way for someone to gain access to a computer. This can be used for legitimate or non-legitimate reasons.



Good
Back Homepage
Back


Article Source:
www.Aphotolog.Com

Answer Questions