A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc.
Computer and network surveillance
Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.
Trojan horse (computing)
(For other uses, see Trojan horse (disambiguation).) In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent.
Flame (malware)
(Not to be confused with Stoned (computer virus) § Flame/Stamford.) Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system.
Windows Genuine Advantage
Windows Genuine Advantage (WGA) is an anti-infringement system created by Microsoft that enforces online validation of the licensing of several recent Microsoft Windows operating systems when accessing several services, such as Windows Update, and downloading Windows components from the Microsoft Download Center.
Carrier IQ
Carrier IQ was a privately owned mobile software company founded in 2005 in Sunnyvale, California.
Phorm
Phorm, formerly known as 121Media, was a digital technology company known for its contextual advertising software.
Movieland
Movieland, also known as Movieland.
Hacking Team
HackingTeam is a Milan-based information technology company that sells offensive intrusion and surveillance capabilities to governments, law enforcement agencies and corporations.
Magic Lantern (software)
Magic Lantern is keystroke logging software developed by the United States' Federal Bureau of Investigation.
Gh0st RAT
Gh0st RAT is a Trojan horse for the Windows platform that the operators of GhostNet used to hack into some of the most sensitive computer networks on Earth.
Privacy-invasive software
Privacy-invasive software is a category of computer software that ignores users’ privacy and that is distributed with a specific intent, often of a commercial nature.
Computer and Internet Protocol Address Verifier
The Computer and Internet Protocol Address Verifier (CIPAV) is a data gathering tool that the Federal Bureau of Investigation (FBI) uses to track and gather location data on suspects under electronic surveillance.
BonziBuddy
BonziBuddy, stylized as BonziBUDDY, is a desktop assistant program distributed by Bonzi Software between 1999 and 2004.
Comet Cursor
Comet Cursor was a software program manufactured by Comet Systems.
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc.
Computer and network surveillance
Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.
Trojan horse (computing)
(For other uses, see Trojan horse (disambiguation).) In computing, Trojan horse, or Trojan, is any malicious computer program which is used to hack into a computer by misleading users of its true intent.
Flame (malware)
(Not to be confused with Stoned (computer virus) § Flame/Stamford.) Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system.
Windows Genuine Advantage
Windows Genuine Advantage (WGA) is an anti-infringement system created by Microsoft that enforces online validation of the licensing of several recent Microsoft Windows operating systems when accessing several services, such as Windows Update, and downloading Windows components from the Microsoft Download Center.
Carrier IQ
Carrier IQ was a privately owned mobile software company founded in 2005 in Sunnyvale, California.
Phorm
Phorm, formerly known as 121Media, was a digital technology company known for its contextual advertising software.
Movieland
Movieland, also known as Movieland.
Hacking Team
HackingTeam is a Milan-based information technology company that sells offensive intrusion and surveillance capabilities to governments, law enforcement agencies and corporations.
Magic Lantern (software)
Magic Lantern is keystroke logging software developed by the United States' Federal Bureau of Investigation.
Gh0st RAT
Gh0st RAT is a Trojan horse for the Windows platform that the operators of GhostNet used to hack into some of the most sensitive computer networks on Earth.
Privacy-invasive software
Privacy-invasive software is a category of computer software that ignores users’ privacy and that is distributed with a specific intent, often of a commercial nature.
Computer and Internet Protocol Address Verifier
The Computer and Internet Protocol Address Verifier (CIPAV) is a data gathering tool that the Federal Bureau of Investigation (FBI) uses to track and gather location data on suspects under electronic surveillance.
BonziBuddy
BonziBuddy, stylized as BonziBUDDY, is a desktop assistant program distributed by Bonzi Software between 1999 and 2004.
Comet Cursor
Comet Cursor was a software program manufactured by Comet Systems.
Studylib tips
Did you forget to review your flashcards?
Try the Chrome extension that turns your New Tab screen into a flashcards viewer!
The idea behind Studylib Extension is that reviewing flashcards will be easier if we distribute all flashcards reviewing into smaller sessions throughout the working day.