About: Backdoor   Sponge Permalink

An Entity of Type : dbkwik:resource/TGVw_48bfxR4O_s_eW_eZQ==, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

A computer virus has been found that could potentially cripple the fleet.

AttributesValues
rdf:type
rdfs:label
  • Backdoor
rdfs:comment
  • A computer virus has been found that could potentially cripple the fleet.
  • A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device.
  • Backdooring (also BDing or BD) is the commonly used term for a strategy whereupon one or more champions will attack the enemy team's structures such as turrets, inhibitors, or the Nexus without the support of their friendly minion wave. In other words, sneaking into the enemy base without having pushed the lane first.
  • A backdoor is a type of door that can be used to access nearly any part of the Matrix. Within the construct, they are a series of dark green doors in a seemingly endless white corridor, unlocked by a special made key. These were used by programs to quickly get from one place to another. In code, these were simply loopholes. At one end of the corridor was a door to the most special rooms, including the door to The Source. Backdoors act as a kind of shortcut hyperlinking system.
  • Backdoor is a hacker resource featured in Battlefield Hardline and one of the most common resources used within the game. It allows the Hacker to take control of objects placed around the map. Upon unlocking version 2.0, the cooldown time for the resource is lowered from normal. Objects that can be controlled include: Camera:Automatically spots enemies in clear view. Gas canister:Floods an area with gas, similar to a Gas Grenade. Transformer:Releases a blinding flash of light, similar to a Flashbang. Battle Pickup:Additional Battle Pickups can be unlocked at certain locations.
  • A backdoor is a means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a backdoor so that the program can be accessed for troubleshooting or other purposes. However, attackers often use backdoors that they detect or install themselves, as part of an exploit. In some cases, a worm is designed to take advantage of a backdoor created by an earlier attack. For example, Nimda gained entrance through a backdoor left by Code Red.
Level
  • *Version 1.0 - Default *Version 2.0 - Bronze Service Star 2
Season
  • 4(xsd:integer)
Attack
  • 21(xsd:integer)
dcterms:subject
ep num
  • 2(xsd:integer)
OriginalDate
  • 2006(xsd:integer)
Giftable
  • Giftable
Stardate
  • 54098(xsd:integer)
dbkwik:battlefield...iPageUsesTemplate
dbkwik:league-of-l...iPageUsesTemplate
dbkwik:leagueofleg...iPageUsesTemplate
dbkwik:mafiawars/p...iPageUsesTemplate
dbkwik:malware/pro...iPageUsesTemplate
dbkwik:stexpanded/...iPageUsesTemplate
dbkwik:computersec...iPageUsesTemplate
Defense
  • 53(xsd:integer)
Date
  • 2010-04-15(xsd:date)
Series
  • USS Baldwin
Name
  • Backdoor
Type
  • Armor
dbkwik:matrix/prop...iPageUsesTemplate
Code
  • 26(xsd:integer)
Quality
  • Rare
PREV
feature
  • Allows automated objects to be taken controlled by the Hacker
Source
NEXT
Year
  • 2377(xsd:integer)
abstract
  • A backdoor is a means of access to a computer program that bypasses security mechanisms. A programmer may sometimes install a backdoor so that the program can be accessed for troubleshooting or other purposes. However, attackers often use backdoors that they detect or install themselves, as part of an exploit. In some cases, a worm is designed to take advantage of a backdoor created by an earlier attack. For example, Nimda gained entrance through a backdoor left by Code Red. Whether installed as an administrative tool or a means of attack, a backdoor is a security risk, because there are always crackers out there looking for any vulnerability to exploit. In her article "Who gets your trust?" security consultant Carole Fennelly uses an analogy to illustrate the situation: "Think of approaching a building with an elaborate security system that does bio scans, background checks, the works. Someone who doesn't have time to go through all that might just rig up a back exit so they can step out for a smoke -- and then hope no one finds out about it."
  • A computer virus has been found that could potentially cripple the fleet.
  • A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device.
  • Backdoor is a hacker resource featured in Battlefield Hardline and one of the most common resources used within the game. It allows the Hacker to take control of objects placed around the map. Upon unlocking version 2.0, the cooldown time for the resource is lowered from normal. Objects that can be controlled include: Camera:Automatically spots enemies in clear view. Gas canister:Floods an area with gas, similar to a Gas Grenade. Transformer:Releases a blinding flash of light, similar to a Flashbang. Battle Pickup:Additional Battle Pickups can be unlocked at certain locations. The Camera provides its own field of view when selected. Other assets can be observed via non-interactive surveillance cameras. Harmful assets are triggered when an enemy player enters its area of effect. After being triggered, the asset will have a "recharging battery" icon and regenerate. Players can spot hacker-controlled assets, and temporarily disable them. Damaged assets will have a wrench icon, and automatically repair after a period of time.
  • A backdoor is a type of door that can be used to access nearly any part of the Matrix. Within the construct, they are a series of dark green doors in a seemingly endless white corridor, unlocked by a special made key. These were used by programs to quickly get from one place to another. In code, these were simply loopholes. At one end of the corridor was a door to the most special rooms, including the door to The Source. Backdoors act as a kind of shortcut hyperlinking system. In the films, the main users of the corridor were Seraph and The Oracle. They have also been used by Neo, Morpheus, The Keymaker, and several of the Virus Smith.
  • Backdooring (also BDing or BD) is the commonly used term for a strategy whereupon one or more champions will attack the enemy team's structures such as turrets, inhibitors, or the Nexus without the support of their friendly minion wave. In other words, sneaking into the enemy base without having pushed the lane first. Another usage of the term Backdoor is when one or more champions push separate lanes whilst the rest of their team distracts or otherwise pressures the opposing team, preventing their recalls. Champions who can quickly push waves, such as Udyr, are commonly used in this form of backdooring. However, the rest of the team must be able to effectively hold off the opposing team for any objectives they may be after, and also able to prevent them from recalling, so that the backdooring champion has time to push up the lane and take the objective they are after. The time to use this form of backdooring is when a minion lane is already naturally pushed into the opponents half, therefore abilities that let you quickly cross the map (such as teleport, or Pantheon's Grand Skyfall or Rek'Sai's Void Rush) are very desirable for this strategy, as it allows the user to quickly move to the pushed lane.
is Type of
is PREV of
is NEXT of
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software