backdoor operation


backdoor operation
backdoor operation (BE) BANK, ECON Stützung des britischen Geldmarkts durch die Bank von England

Englisch-Deutsch Fachwörterbuch der Wirtschaft . 2013.

Schlagen Sie auch in anderen Wörterbüchern nach:

  • Operation Green (Ireland) — Operation Green (German: Unternehmen Grün) often also referred to as Case Green (Fall Grün) or Plan Green (Plan Grün), was a full scale operations plan for a German invasion of Ireland in support of Operation Sea Lion (Unternehmen Seelöwe).[1][2] …   Wikipedia

  • Operation Aurora — was a cyber attack which began in mid 2009 and continued through December 2009.[1] The attack was first publicly disclosed by Google on January 12, 2010, in a blog post.[2] In the blog post, Google said the attack originated in China. The attacks …   Wikipedia

  • Operation: Bot Roast — is an operation by the FBI to track down bot herders, crackers, or virus coders who install malicious software on computers through the Internet without the owners’ knowledge, which turns the computer into a zombie computer that then sends out… …   Wikipedia

  • Backdoor (computing) — A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may …   Wikipedia

  • Operation Snow White — Grand Jury Charges, Introduction, United States of America v. Mary Sue Hubbard , United States District Court for the District of Columbia, 1979. Operation Snow White was the Church of Scientology s name for a conspiracy during the 1970s to purge …   Wikipedia

  • Timeline of computer viruses and worms — Contents 1 1960–1969 1.1 1966 2 1970–1979 2.1 1 …   Wikipedia

  • Dual_EC_DRBG — or Dual Elliptic Curve Deterministic Random Bit Generator[1] is a controversial pseudorandom number generator (PRNG) designed and published by the National Security Agency. It is based on the elliptic curve discrete logarithm problem (ECDLP) and… …   Wikipedia

  • Computer insecurity — This article is about computer security exploits and defenses. For computer security through design and engineering, see computer security. Computer security Secure operating systems Security architecture Security by design Secure coding …   Wikipedia

  • BitLocker Drive Encryption — infobox software caption = developer = Microsoft latest release version = 1.0 latest release date = January 30, 2007 programming language = C, C++, AssemblerFact|date=June 2008 operating system = Windows Vista, Windows Server 2008 language =… …   Wikipedia

  • Conficker — Common name Aliases Mal/Conficker A(Sophos) Win32/Conficker.A (CA) W32.Downadup (Symantec) W32/Downadup.A (F Secure) Conficker.A (Panda) Net Worm.Win32.Kido.bt ( …   Wikipedia

  • Бэкдор — Бэкдор, backdoor (от англ. back door, чёрный ход) программы, которые устанавливает взломщик на взломанном им компьютере после получения первоначального доступа с целью повторного получения доступа к системе. При подключении предоставляет… …   Википедия