{"id":11615,"date":"2022-01-15T02:46:28","date_gmt":"2022-01-15T07:46:28","guid":{"rendered":"http:\/\/local.brightwhiz\/?post_type=glossary&p=11615"},"modified":"2022-01-15T02:46:30","modified_gmt":"2022-01-15T07:46:30","slug":"backdoor","status":"publish","type":"glossary","link":"http:\/\/local.brightwhiz\/glossary\/backdoor\/","title":{"rendered":"Backdoor"},"content":{"rendered":"\n
A backdoor in computing is a covert method of bypassing authorized access channels like normal authentication or encryption in a computing environment. They are most often used for securing remote access to a computer in order to execute a far greater payload or malicious intent such as to gain access to privileged information like passwords, emails, or files, corrupt or delete data on hard drives or transfer information out of the network.<\/p>\n\n\n\n