Trap doors and Logic Bombs, Basic Computer Science

Trap doors: This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impacted by) by malware, one or more backdoors may be installed for easier future access to the system.   

Logic Bombs/ Time Bombs:

Logic Bombs are not programs in their own right but rather camouflaged segments of other programs. They are not considered viruses because they do not replicate. But their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive. For example, some malicious programs are sot off during days such as April Fools Day or Friday the 13th.  

Posted Date: 10/23/2012 5:48:44 AM | Location : United States







Related Discussions:- Trap doors and Logic Bombs, Assignment Help, Ask Question on Trap doors and Logic Bombs, Get Answer, Expert's Help, Trap doors and Logic Bombs Discussions

Write discussion on Trap doors and Logic Bombs
Your posts are moderated
Related Questions
Satellite Transmission: Satellites use microwave frequencies and techniques. Satellites used for message transmission (as opposed to those, which travel around the earth on st

Question (a) What is a view? (b) Can we use a view to insert or update a record into a table? Do we have any limitation to perform the above command? (c) The syntax to cr

i have an android app which uses a database file called question db which is stored in the assets file. I have tried a database example called android application development but f



Diskless workstations:    Most people assume that the operating system is stored on a disk that is connected directly to the computer, but this is not necessarily true. If the

ATM Theory - Unspecified Bit Rate Is intended for non-real time applications, that is, those not requiring tightly constrained delay and delay variation. Examples of applications

Question 1 Explain the functional units of a basic computer with a neat diagram Question 2 Explain how you can get 1's complement of a given binary number? Also explain 1'

QUESTION (a) For each of the following systems, determine whether the system is (1) stable, (2) causal, (3) linear, (4) time invariant, (5) passive (i) Y[n] = x[-n] (ii)

Multiprocessor DSP Systems Over modern times several organizations have provided forums made up of several DSPs. More lately, semiconductor organizations have been providing sn