Trap doors and Logic Bombs, Basic Computer Science

Trap doors: This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impacted by) by malware, one or more backdoors may be installed for easier future access to the system.   

Logic Bombs/ Time Bombs:

Logic Bombs are not programs in their own right but rather camouflaged segments of other programs. They are not considered viruses because they do not replicate. But their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive. For example, some malicious programs are sot off during days such as April Fools Day or Friday the 13th.  

Posted Date: 10/23/2012 5:48:44 AM | Location : United States







Related Discussions:- Trap doors and Logic Bombs, Assignment Help, Ask Question on Trap doors and Logic Bombs, Get Answer, Expert's Help, Trap doors and Logic Bombs Discussions

Write discussion on Trap doors and Logic Bombs
Your posts are moderated
Related Questions
how to save a Vector theList to a .txt file and read that .txt file to a jsp page /??

Question 1: (a) Initially, human information processing was believed to occur in 4 distinct stages. State and describe each of those stages. (b) What are the 3 types of

Data Type:  Data Type: Anything that is processed by a computer is called data. There are different types of data that can be given to the computer for processing. A  data typ

Find shortest path from node 1 to node 10 in the network shown in figure, also find shortest path from node 3 to node 10. Please write all steps to finding shortest path mechanism

how can use joystick

Earlier than anything we must describe the file transfer area or DTA. With the intention of sequentially read we use the 14H function of the 21Hinterruption.The register to be read

The primary step is to start the Debug; this step only consists of typing debug [Enter] on the operative system on time. the "a" (assemble) command is used To assemble a program on

Question 1 Differentiate between PL/SQL functions and procedures Question 2 Draw the diagram of logical structure of oracle database and explain it in brief Question 3 D

Round robin (RR) is one of the simplest, oldest, fairest and most extensively used algorithms. • In the round robin scheduling, processes are posted in a FIFO manner but are given

Sequential-access memory device: A  Sequential-access  memory device reads data in sequence. In other words, information on a serial device can only be retrieved in the same s