The page may not load correctly.
|Back-doors||Brute force attacks||Defacement||DoS-attacks|
|Key-loggers||Logic bombs||Mail bombs||Phishing|
Back-doors — programs enable logging on into the system or obtaining the privileged function and bypassing existing access system. It is often used to bypass existing security system. Back-doors do not infect files, but they write themselves into register modifying the register keys in the process.