{"id":11615,"date":"2022-01-15T02:46:28","date_gmt":"2022-01-15T07:46:28","guid":{"rendered":"http:\/\/local.brightwhiz\/?post_type=glossary&p=11615"},"modified":"2022-01-15T02:46:30","modified_gmt":"2022-01-15T07:46:30","slug":"backdoor","status":"publish","type":"glossary","link":"http:\/\/local.brightwhiz\/glossary\/backdoor\/","title":{"rendered":"Backdoor"},"content":{"rendered":"\n

A backdoor in computing is a covert method of bypassing authorized access channels like normal authentication or encryption in a computing environment. They are most often used for securing remote access to a computer in order to execute a far greater payload or malicious intent such as to gain access to privileged information like passwords, emails, or files, corrupt or delete data on hard drives or transfer information out of the network.<\/p>\n\n\n\n

A backdoor may be in the form of a Trojan<\/a> disguised as a legitimate file that the user is tricked into downloading or opening. It could also be code deliberately written into the firmware of the hardware, parts of an operating system, or propriety software.<\/p>\n\n\n\n

There are legitimate use cases for backdoors such as providing the manufacturer of hardware devices with a way to restore user passwords, administrators to reset customer’ systems, etc.<\/p>\n","protected":false},"excerpt":{"rendered":"

A backdoor in computing is a covert method of bypassing authorized access channels like normal authentication or encryption in a computing environment. They are most often used for securing remote…<\/p>\n","protected":false},"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"glossary-index":[671],"yoast_head":"\nBackdoor Definition - Brightwhiz.com<\/title>\n<meta name=\"description\" content=\"A backdoor in computing is a covert method of bypassing authorized access channels like authentication or encryption in a computer\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/local.brightwhiz\/glossary\/backdoor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backdoor Definition - Brightwhiz.com\" \/>\n<meta property=\"og:description\" content=\"A backdoor in computing is a covert method of bypassing authorized access channels like authentication or encryption in a computer\" \/>\n<meta property=\"og:url\" content=\"http:\/\/local.brightwhiz\/glossary\/backdoor\/\" \/>\n<meta property=\"og:site_name\" content=\"Brightwhiz.com\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/brightwhiz\/\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-15T07:46:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@brightwhizmag\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/local.brightwhiz\/glossary\/backdoor\/\",\"url\":\"http:\/\/local.brightwhiz\/glossary\/backdoor\/\",\"name\":\"Backdoor Definition - Brightwhiz.com\",\"isPartOf\":{\"@id\":\"http:\/\/local.brightwhiz\/#website\"},\"datePublished\":\"2022-01-15T07:46:28+00:00\",\"dateModified\":\"2022-01-15T07:46:30+00:00\",\"description\":\"A backdoor in computing is a covert method of bypassing authorized access channels like authentication or encryption in a computer\",\"breadcrumb\":{\"@id\":\"http:\/\/local.brightwhiz\/glossary\/backdoor\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/local.brightwhiz\/glossary\/backdoor\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/local.brightwhiz\/glossary\/backdoor\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/local.brightwhiz\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossary\",\"item\":\"http:\/\/local.brightwhiz\/glossary\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Backdoor\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/local.brightwhiz\/#website\",\"url\":\"http:\/\/local.brightwhiz\/\",\"name\":\"Brightwhiz.com\",\"description\":\"Best Tech guides, Tutorials, and News\",\"publisher\":{\"@id\":\"http:\/\/local.brightwhiz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/local.brightwhiz\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/local.brightwhiz\/#organization\",\"name\":\"Brightwhiz\",\"url\":\"http:\/\/local.brightwhiz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/local.brightwhiz\/#\/schema\/logo\/image\/\",\"url\":\"http:\/\/local.brightwhiz\/wp-content\/uploads\/2021\/11\/brightwhiz-com-logo-orange.png\",\"contentUrl\":\"http:\/\/local.brightwhiz\/wp-content\/uploads\/2021\/11\/brightwhiz-com-logo-orange.png\",\"width\":706,\"height\":135,\"caption\":\"Brightwhiz\"},\"image\":{\"@id\":\"http:\/\/local.brightwhiz\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/brightwhiz\/\",\"https:\/\/twitter.com\/brightwhizmag\",\"https:\/\/instagram.com\/bright_whiz\/\",\"https:\/\/www.pinterest.com\/sobbayi\/\",\"https:\/\/www.youtube.com\/channel\/UC6sCdP_d_RiTIM7ErFT-PSQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Backdoor Definition - Brightwhiz.com","description":"A backdoor in computing is a covert method of bypassing authorized access channels like authentication or encryption in a computer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/local.brightwhiz\/glossary\/backdoor\/","og_locale":"en_US","og_type":"article","og_title":"Backdoor Definition - Brightwhiz.com","og_description":"A backdoor in computing is a covert method of bypassing authorized access channels like authentication or encryption in a computer","og_url":"http:\/\/local.brightwhiz\/glossary\/backdoor\/","og_site_name":"Brightwhiz.com","article_publisher":"https:\/\/www.facebook.com\/brightwhiz\/","article_modified_time":"2022-01-15T07:46:30+00:00","twitter_card":"summary_large_image","twitter_site":"@brightwhizmag","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/local.brightwhiz\/glossary\/backdoor\/","url":"http:\/\/local.brightwhiz\/glossary\/backdoor\/","name":"Backdoor Definition - Brightwhiz.com","isPartOf":{"@id":"http:\/\/local.brightwhiz\/#website"},"datePublished":"2022-01-15T07:46:28+00:00","dateModified":"2022-01-15T07:46:30+00:00","description":"A backdoor in computing is a covert method of bypassing authorized access channels like authentication or encryption in a computer","breadcrumb":{"@id":"http:\/\/local.brightwhiz\/glossary\/backdoor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/local.brightwhiz\/glossary\/backdoor\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/local.brightwhiz\/glossary\/backdoor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/local.brightwhiz\/"},{"@type":"ListItem","position":2,"name":"Glossary","item":"http:\/\/local.brightwhiz\/glossary\/"},{"@type":"ListItem","position":3,"name":"Backdoor"}]},{"@type":"WebSite","@id":"http:\/\/local.brightwhiz\/#website","url":"http:\/\/local.brightwhiz\/","name":"Brightwhiz.com","description":"Best Tech guides, Tutorials, and News","publisher":{"@id":"http:\/\/local.brightwhiz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/local.brightwhiz\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/local.brightwhiz\/#organization","name":"Brightwhiz","url":"http:\/\/local.brightwhiz\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/local.brightwhiz\/#\/schema\/logo\/image\/","url":"http:\/\/local.brightwhiz\/wp-content\/uploads\/2021\/11\/brightwhiz-com-logo-orange.png","contentUrl":"http:\/\/local.brightwhiz\/wp-content\/uploads\/2021\/11\/brightwhiz-com-logo-orange.png","width":706,"height":135,"caption":"Brightwhiz"},"image":{"@id":"http:\/\/local.brightwhiz\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/brightwhiz\/","https:\/\/twitter.com\/brightwhizmag","https:\/\/instagram.com\/bright_whiz\/","https:\/\/www.pinterest.com\/sobbayi\/","https:\/\/www.youtube.com\/channel\/UC6sCdP_d_RiTIM7ErFT-PSQ"]}]}},"_links":{"self":[{"href":"http:\/\/local.brightwhiz\/wp-json\/wp\/v2\/glossary\/11615"}],"collection":[{"href":"http:\/\/local.brightwhiz\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"http:\/\/local.brightwhiz\/wp-json\/wp\/v2\/types\/glossary"}],"replies":[{"embeddable":true,"href":"http:\/\/local.brightwhiz\/wp-json\/wp\/v2\/comments?post=11615"}],"wp:attachment":[{"href":"http:\/\/local.brightwhiz\/wp-json\/wp\/v2\/media?parent=11615"}],"wp:term":[{"taxonomy":"glossary-index","embeddable":true,"href":"http:\/\/local.brightwhiz\/wp-json\/wp\/v2\/glossary-index?post=11615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}