Backdoors

Some articles on backdoors, backdoor:

Grayware - Concealment: Trojan Horses, Rootkits, and Backdoors - Backdoors
... A backdoor is a method of bypassing normal authentication procedures ... Once a system has been compromised, one or more backdoors may be installed in order to allow easier access in the future ... Backdoors may also be installed prior to malicious software, to allow attackers entry ...
Computer Insecurity - Vulnerabilities - Backdoors
... A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on ... The backdoor may take the form of an installed program (e.g ... A specific form of backdoors are rootkits, which replaces system binaries and/or hooks into the function calls of the operating system to hide the presence of other programs, users, services and open ports ...
Backdoor (computing) - Overview
... The threat of backdoors surfaced when multiuser and networked operating systems became widely adopted ... trapdoor here clearly coincides with more recent definitions of a backdoor ... A backdoor in a login system might take the form of a hard coded user and password combination which gives access to the system ...