Trap doors and Logic Bombs, Basic Computer Science

Trap doors: This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impacted by) by malware, one or more backdoors may be installed for easier future access to the system.   

Logic Bombs/ Time Bombs:

Logic Bombs are not programs in their own right but rather camouflaged segments of other programs. They are not considered viruses because they do not replicate. But their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive. For example, some malicious programs are sot off during days such as April Fools Day or Friday the 13th.  

Posted Date: 10/23/2012 5:48:44 AM | Location : United States







Related Discussions:- Trap doors and Logic Bombs, Assignment Help, Ask Question on Trap doors and Logic Bombs, Get Answer, Expert's Help, Trap doors and Logic Bombs Discussions

Write discussion on Trap doors and Logic Bombs
Your posts are moderated
Related Questions
Q1: ER modelling & logical design. An information system is required for an online auction site, based on the following speci?cation: Only registered users can use the site. Privat

A palindrome is a string that reads the same from both the ends. Given a string S convert it to a palindrome by doing character replacement. Your task is to convert S to palindrome

Ask question describes deadlock avoidance#Minimum 100 words accepted#

Problem: a) Explain the basic functions of a computer: inputting, processing, storing and outputting. b) List four types of memory and explain how each wor

HARDWARE BASICS In the foregoing section of this Unit, an attempt has been made to explain to you the historic perspective relating to the development of computer from its ear

Printer output : Consider what is required here. Do you just require management information on the one hand or camera copy for reprographic purposes? Inkjet Very quiet. C

#queA register is a memory location surrounded by the CPU itself, designed to be rapidly accessed for purposes of fast data retrieval. Processors normally hold a register array, wh

For the formation of a program it is necessary to follow five steps: Design of the algorithm, stage the problem to be solved is reputable and the best solution is proposed, creatin

A string S is said to be "Super ASCII", if it contains the character frequency equal to their ascii values. String will contain only lower case alphabets (''''''''a''''''''-'''''''

In view of the fact that processes frequently need to communicate with other processes therefore, there is require for a well-structured interaction, devoid of using interrupts, a