![]() Since it does not affect the normal communication in the network, it is incredibly hard for an IDS or firewall to detect its existence. ![]() The modus operandi is that it opens a certain port and provides access to a remote computer in the network to control the PC. It is worth mentioning that the backdoor itself is not dangerous because it does not duplicate or actively spreads. The cryptosystem behind the backdoor can enter your computer by taking the form of an installed program or could be a modification of an application you already installed. Backdoor refers to a method of bypassing normal authentication and gaining access remotely to a computer along with all the data stored inside while remaining undetected.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |