Backdoor?
A back door is a means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a back door so that the program can be accessed for troubleshooting or other purposes. However, attackers often use back doors that they detect or install themselves, as part of an exploit. In some cases, a worm is designed to take advantage of a back door created by an earlier attack. For example, Nimda gained entrance through a back door left by Code Red.
Whether installed as an administrative tool or a means of attack, a back door is a security risk, because there are always crackers out there looking for any vulnerability to exploit.
WAYS OF INFECTION
Typical backdoors can be accidentally installed by unaware users. Some backdoors come attached to e-mail messages or are downloaded from the Internet using file sharing programs. Their authors give them unsuspicious names and trick users into opening or executing such files (Trojan horse).
Backdoors often are installed by other parasites like viruses, worms or even spyware (evenantispywaree.g. AdWareSpyWareSE). They get into the system without user knowledge and consent and affect everybody who uses a compromised computer. Some threats can be manually installed by malicious local users who have sufficient privileges for the software installation.
EXAMPLE OF BACKDOORS
Remote Connection, also known as Redneck, is a dangerous backdoor that gives the remoteattacker full access to a compromised computer. The parasite can shutdown or restart a PC, manage files, record user keystrokes, install and run various programs, take screenshots and perform other malicious actions. Remote Connection runs on every Windows startup. Other examples are Net Master, Net Bus Etc.
HOW TO CREATE A BACKDOOR WINDOW
Step 1: On the welcome screen press 5 times shift key.
Step 2:A stiky pop up will be open just click on yes.
Step 3: Then just login from admin account and go on system32 folder.
Step 4: Copy sethc.exe and cmd.exe on the desktop.
Step 5: Then go on the folder option,View, deselect Hide extension for known file type.
Step 6: Rename sethc.exe to cmd.exe and vice versa.
Step 7: Copy paste and replace both files of system32 with your file.
Step 8: Then logoff and press shift 5 times then cmd will open from there you can do anything with that computer.
HOW TO REMOVE A BACKDOOR
Backdoors work in the same manner as the computer viruses and therefore can be found and removed with the help of effective antivirus products like Symantec Norton AntiVirus, KasperskyAnti-Virus.etc. Some advanced spyware removers, which are able to scan the system in a similar way antivirus software does and have extensive parasite signature databases can also detect and remove certain backdoors and related components.Powerful anti-spyware solutions such as Spyware Doctor, Microsoft Anti-Spyware Beta etc. There are Internet resources such as 2-Spyware.com, which provide manual malware removal instructions. These instructions allow the user to manually delete all the files, directories, registry entries and other objects that belong to a parasite. However, manual removal requires fair system knowledge and therefore can be a quite difficult and tedious task for novices.
__________________________________________________________________________
About the author of this Article:
Wow! So well explained in such simple words. I must admit that I Enjoyed reading it. Great job!