“ They in the back… ”

You ever snuck out the house at night but, when you got back your key isn’t keying because mummy has triple locked the front door. But you’re smart, because you left the backdoor open, so its 1-0 to you. This is similar to what hackers do, they leave the backdoor open on your system so they can have unlimited access without your knowledge; it also means they don’t have to hack you again.

Fun fact: The first Trojan virus was developed in 1990.

This method is called a backdoor and it’s used to gain unauthorised access into a system. But, how do they end up on your computer? They come in the form of a Trojan. A trojan is a type of malware that looks legit, but is actually malicious and it just sits there stealing data, spying on your computer activity. However, backdoors are not always malicious, they are usually built into your computer or software to allow the IT guys access into your system in order to help you out and resolve any issues.

Seeing as a backdoor is mainly a means for hackers to re-enter your system, they can use it to do anything they please. They could use it to: steal data; spy on you; or even install any type of malware they want, including the infamous ‘key-logger’. We all know how bad those things are, but if you don’t know, then take a look at my blog on key-loggers: https://ttprotocol.com/2022/02/15/keylogs/

In 2005 there was a huge incident that occurred where Sony sent out 22 million music CDs. These CDs  actually contained a root-kit*, that when installed, it would install software onto your computer, which monitored what you were listening to. These CDs caused vulnerabilities that left security holes which could be exploited, or slow down your computer performance, and was impossible to uninstall. Sony denied that the CDs were harmful but recalled a few million of the affected CDs.

It’s important to note that hackers usually target weak passwords and out-of-date software. This is useful to know in protecting yourself against backdoor attacks. If you follow ‘Tips with T’, you can also see ways that you can protect yourselves.

‘Tips with T’
– Use a password manager
– Keep software up to date
– Use anti-virus software
* it’s a collection of software used to gain access to a computer

And don’t forget to subscribe… 

Love & Guidance

TT

5 thoughts on ““ They in the back… ”

Leave a reply to Ro Cancel reply