Backdoor
Backdoor or "back door", the security of computer systems, refers to mechanisms that can be used to access the system, application, or network, apart from a common mechanism used (through the logon process or other authentication process). Also referred to as a back door.
Backdoor was originally created by computer programmers as a mechanism that allows them to gain special access to their programs, often used to justify and improve the code in the program that they created when a crash occurs due to a bug. One example of this statement is when Kenneth Thompson (one of the UNIX operating system programmer to make a program the login process in 1983 when it received the Turing Award), in addition to the login program is commonly used in UNIX operating system using C programming language, so that he can access UNIX systems that run on the internal network of Bell Labs. Backdoor he created it to protect themselves from detection and disposal of the system, even if the user finds it, because it makes her own backdoor again (do recompiling itself).
Some software developers add a backdoor into a homemade program for the purpose of destroying (or suspicious purposes.) For example, a backdoor can be inserted into the code in an online shopping site (e-commerce) to allow the developer to obtain information on transactions that occur between buyers and sellers, including the credit card.
Backdoor term now used by hackers to refer to a mechanism that allows a hacker to access the system back to a system that has previously attacked without having to repeat the process of exploitation of the system or network, as he did the first time. Generally, after a network has been attacked by using exploits (against an insecurity / vulnerability), an attacker would cover all his tracks in the system concerned with modifying the file system records (logs) or delete it, and then install a backdoor in the form of a softwarespecial or adding a user account that has permissions as the network administrator or the administrator of the system. If the then owner of the network or system is aware that the system has been attacked, and then close all the known vulnerabilities in the system (but do not detect any installed backdoor), previously a striker who will still be able to access the system in question, without getting caught by the owner of the network, let alone after he enrolled as a legitimate user on the system or network. By having the right as a network administrator, he was able to do things that can damage the system or remove the data. In cases like the above, a commonly used way is by doing a reinstallation of the system or network, or by doing a restoration of the backup / backups that are still clean from the backdoor.
There are some devices that can be used to install a backdoor, like some Trojan horses, but the popular ones are netcat, which can be used in Windows or UNIX operating system.
Backdoor or "back door", the security of computer systems, refers to mechanisms that can be used to access the system, application, or network, apart from a common mechanism used (through the logon process or other authentication process). Also referred to as a back door.
Backdoor was originally created by computer programmers as a mechanism that allows them to gain special access to their programs, often used to justify and improve the code in the program that they created when a crash occurs due to a bug. One example of this statement is when Kenneth Thompson (one of the UNIX operating system programmer to make a program the login process in 1983 when it received the Turing Award), in addition to the login program is commonly used in UNIX operating system using C programming language, so that he can access UNIX systems that run on the internal network of Bell Labs. Backdoor he created it to protect themselves from detection and disposal of the system, even if the user finds it, because it makes her own backdoor again (do recompiling itself).
Some software developers add a backdoor into a homemade program for the purpose of destroying (or suspicious purposes.) For example, a backdoor can be inserted into the code in an online shopping site (e-commerce) to allow the developer to obtain information on transactions that occur between buyers and sellers, including the credit card.
Backdoor term now used by hackers to refer to a mechanism that allows a hacker to access the system back to a system that has previously attacked without having to repeat the process of exploitation of the system or network, as he did the first time. Generally, after a network has been attacked by using exploits (against an insecurity / vulnerability), an attacker would cover all his tracks in the system concerned with modifying the file system records (logs) or delete it, and then install a backdoor in the form of a softwarespecial or adding a user account that has permissions as the network administrator or the administrator of the system. If the then owner of the network or system is aware that the system has been attacked, and then close all the known vulnerabilities in the system (but do not detect any installed backdoor), previously a striker who will still be able to access the system in question, without getting caught by the owner of the network, let alone after he enrolled as a legitimate user on the system or network. By having the right as a network administrator, he was able to do things that can damage the system or remove the data. In cases like the above, a commonly used way is by doing a reinstallation of the system or network, or by doing a restoration of the backup / backups that are still clean from the backdoor.
There are some devices that can be used to install a backdoor, like some Trojan horses, but the popular ones are netcat, which can be used in Windows or UNIX operating system.