Trap doors and Logic Bombs, Basic Computer Science

Trap doors: This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impacted by) by malware, one or more backdoors may be installed for easier future access to the system.   

Logic Bombs/ Time Bombs:

Logic Bombs are not programs in their own right but rather camouflaged segments of other programs. They are not considered viruses because they do not replicate. But their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive. For example, some malicious programs are sot off during days such as April Fools Day or Friday the 13th.  

Posted Date: 10/23/2012 5:48:44 AM | Location : United States







Related Discussions:- Trap doors and Logic Bombs, Assignment Help, Ask Question on Trap doors and Logic Bombs, Get Answer, Expert's Help, Trap doors and Logic Bombs Discussions

Write discussion on Trap doors and Logic Bombs
Your posts are moderated
Related Questions
Transaction-based model: Here,  the pricing is based on providing a committed business service, for ex, processing payroll for a global company as part of HR offering and this

how much it cost for 8 week class

Control Unit of the processor: The  Control Unit  of the processor is that unit which controls and coordinates the execution of instructions by the processor. It is responsibl


Explain Canonical cover and Extraneous Attributes with examples.

Why we need data mining? Give an example to illustrate your answer.

Database Management Software: For storage of large amounts of varied data, and rapid retrieval and interpretations of data, the database is the ideal tool. It is most useful for s

Question: Imagine that you are part of a design team creating a new mobile phone for people such as "Angel White" whose persona is given below: Angel is turning 90 years old

Question 1 Explain boundary fill and flood fill polygon filling algorithm Question 2 Draw and explain the block diagram of typical workstation Question 3 Explain the ras

Input and Output device: After having understood the characteristics relating to CPU and storage media, let us try to learn about I/O aspects of a computer system. Input /outp