Trap doors and Logic Bombs, Basic Computer Science

Trap doors: This is a way of bypassing normal authentication procedure (windows/ operating system user name  and password) to access a system. Once a system is compromised (impacted by) by malware, one or more backdoors may be installed for easier future access to the system.   

Logic Bombs/ Time Bombs:

Logic Bombs are not programs in their own right but rather camouflaged segments of other programs. They are not considered viruses because they do not replicate. But their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive. For example, some malicious programs are sot off during days such as April Fools Day or Friday the 13th.  

Posted Date: 10/23/2012 5:48:44 AM | Location : United States







Related Discussions:- Trap doors and Logic Bombs, Assignment Help, Ask Question on Trap doors and Logic Bombs, Get Answer, Expert's Help, Trap doors and Logic Bombs Discussions

Write discussion on Trap doors and Logic Bombs
Your posts are moderated
Related Questions
User-level threads apply in user-level libraries, before via systems calls, so thread switching does not require to call operating system and to cause interrupt to the kernel. Actu

Here are the more specific requirements and the related points - use the below as a check-off list when you make your presentation.  Please note . . . many of the requirements are

Internal interruptions are produced by convinced events which come during the execution of a program. These types of interruptions are handled on their totality by the hardware and

. State laws of transverse vibrations in stretched strings. Explain how do you verify them using sonometer.

Question 1 What is Content Addressable Storage? Explain the elements of Content Addressable Storage Question 2 Explain briefly about DAS Question 3 Explain about N

Give birth to new life forms A research of Artificial Life will definitely throw light on what it means for a complex application to be 'alive'. Moreover, ALife researchers th

write a program of circle of any colour

Suppose that you are writing a stored procedure to record new purchases. Suppose that you know that while your procedure is running, another stored procedure that records shipment

Array: Array  :  In programming, when large amount of related data needs to be processed and each data element is stored with different a variable name, it becomes very diffic

Question Elaborate the various steps in performing a Mail Merge. Perform one mail merge operation for sending invitation for a conference which is being conducted in your organ