WhatIs: Backdoor

If there is a method for a computer to receive commands from someone else instead of the user, that method is called a backdoor. Backdoors that allow full control over the operating system are said to be "universal".

There can be backdoors in hardware or software.

Sometimes, backdoors that are designed for "legitimate" uses are exploited illegitimately.


Related

Comments

Popular

Intel 7th and 8th generation processor graphics driver for Windows 7/8/8.1

AV1 vs VP9 vs AVC (h.264) vs HEVC (h.265): Part II - Fidelity

AV1 vs VP9 vs AVC (h.264) vs HEVC (h.265): Part IV - Decode

AV1 vs VP9 vs AVC (h.264) vs HEVC (h.265): Part I - Lossless

OBS Studio settings for best quality (loseless) recording

AV1 vs VP9 vs AVC (h.264) vs HEVC (h.265): Part III - Quality

Install VMAF on Fedora, CentOS/Red Hat (RHEL)