So, with backdoors: it's a very simple name for a very simple thing. The "frontdoor" of the computer is where data normally goes in and out of the computer, and much like in a shop, thays where the scanners are to make sure you ain't robbing anything. A "backdoor" is where someone just avoids all those scanners by going in somewhere you don't normally go in. As for "they've gotten into all my systems", yes, unplugging your Internet would work to stop any (further) data transfer, but thats kinda risky, as A you might have stuff connected to you via the Internet that you want to stay connected to, or B whatever worm they infected your computer with is programmed with a "if: not connected to Internet; delete everything and get fry the computer", and then you've lost everything and it's at best a pain to get it all back, at worst flat out impossible.
I would argue that a backdoor is a was to access a system which is not supposed to be there. A malicious useraccount (created by the attacker) or a AD skeleton-key. Both use the legitimate login ways, look legit to scanners, acces controls etc.
@@jojo-lp5ls i probably wouldn't classify those as a backdoor, specifically because they don't avoid the typical scanners, they just say "yep, we are perfectly normally things, don't worry about us". A backdoor, to me, is a specific subset of ways in which you can access a computer your not supposed to access, not just any possible way to do so. Thag being said, my knowledge of these things is limited, so maybe there is an official definition of what a backdoor is, and maybe an AD skeleton key is actually something i would think is a backdoor, I'm honestly not sure.
Like with a lot of other terms in the world in it, there is no clear cut definition. I would agree with you saying that it is the way of bypassing the typical authentication methods. On the other Hand, in my daily job in IT-Security, I would refer to my "hidden" way back into a system or organisation or network after I have been kicked out (the persistent access I created after gaining access). This is a more broad definition of the term, it is more a concept when you use it like that.
Backdoors can also mean intentional ways of the developer/company to access a persons system. E.g. Apple implements a way that their support can access your phone directly without your knowledge.
@@johannoas1 oh, yes, intentional backdoors exist, either for the reasons you mentioned, or so the coder can sell the way to access the backdoor to others (assuming they don't get caught having done so). Didn't bother to mention about it in the original comment because it was kinda frivolous. And i didn't have any examples, so thank you for providing one.
Backdoors are a bit jargon. The hacker cinematic is for example if a nefarious programmer who makes code where if you ping, it grants access vs asking user for permission. But these do exist. Example is in OS to update system and so on, and exploited by doing so without asking permission from user. Anything that auto updates is essentially using a "backdoor" Imagine if it say it used say discord updater to use discord.
Mydoom was the fastest spreading email worm ever, but its (see Pravus) payload was set to "detonate" 4 days after it was discovered, and it was a DDoS attack against a single domain. Which meant it was fairly tame, variants have popped up with more insidious payloads but email filters and reputation based spam filtering have rendered email worms impotent in todays security landscape.
@@19wongs4 That's understandable, MyDoom actually had more infections, but Morris was so early in the internet (called arpanet back then) that it still almost wiped everything out
Backdoor refers to a opening in code the programmers left open for updating the code easier etc. Could also be in reference to a Rouge programmer to put a back door to be able to remote onto computers or launch a rat onto a computer. Or turn the computer into a bot net.
Hey there! Programming student here! No matter how secure a connection is, there are always ways to read or write a little more data then intended. A server, be as secure as possible would still be either built on Linux or Windows server pack at the end of the day. And no matter what, if the operating system is known there sure are ways to get access. Why do you think Wannacry got so many peoplr in trouble? The Idea that something is "as secure as it can be" is just flat out a lie. Come at me Linux and Windows server users, but there is always a "crack in the code" and in the security. That is why Moral "white hat" hackers are a thing. Also: the mode missed a big infectivity possibility. Spoofed Emails, Unicode Emails, Tiny Popups (let me explain, the browser opens a tiny popup in a new window. Most of "watch movie free" pages used these as Bitcoin miners)
I always find it annoying when anyone ever says something about x operating system doesn't get viruses at all or something dumb like that, like how some mac users I know tend to spout they can't get viruses
For some reason, I literally was thinking about you singing the Its/It’s song earlier today. I have no idea why this was on my mind this morning, and now here you are singing it in the video. Strange coincidences I’m telling you.
A backdoor is any method of control over any device that can be used without the user's consent. - it has nothing to do with antivirus, "backdoor" is programing jargon that some software engineers (also known as hackers) use.
3:39 While I understand what you mean. The "hacking" simply is the process of gaining access an uploading it's payload to those systems. This means that once the upload is complete, it's simply too late to just unplug the internet at that point. Besides it's far more complicated than just unplugging your own device. But that's a loooong story. There's A LOT going on between your pc and the provider.