1 / 12

SOFTWARE

SOFTWARE. BACKDOOR. *Any hidden method for obtaining remote access to a computer or other system. * It typically works by allowing someone or something with knowledge of it to use a special password(s) and/or other actions to by pass the normal authentication.

opal
Download Presentation

SOFTWARE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SOFTWARE

  2. BACKDOOR *Any hidden method for obtaining remote access to a computer or other system. * It typically works by allowing someone or something with knowledge of it to use a special password(s) and/or other actions to by pass the normal authentication. ->(e.g., user name and password) procedure on a remote machine ->(i.e., a computer located elsewhere on the Internet or other network) to gain access to the all-powerful root (i.e., administrative) account. *It is designed to remain hidden to casual, or even careful, inspection.

  3. BACKDOOR • Backdoors can be planted into computers in any of several ways. • By inserting them into the source code of otherwise legitimate software • -> i.e., an operating systems or an application program. • This can be done intentionally by the company that develops the software, by one or more employees of the company without knowledge of the management, or by outsiders who secretly gain access to the software while it is being developed or updated. • (2) A second is through the use of viruses, worms or other malware • ->i.e., malicious software • that are specifically developed for the purpose of planting backdoors. This malware can gain access to a computer in any of numerous ways, including through the opening of infected e-mail attachments, the downloading of files from the Internet, or merely visiting certain web sites.

  4. BACKDOOR (3) A third is by hiding them in an algorithm that is used in programs. ->An algorithm is a set of unambiguous rules that specify how to solve some problem or perform some task. ->Algorithms are fundamental to the operation of software, and a single infected algorithm could be used in a number of programs. (4) A fourth is to modify a compiler so that it recognizes a short segment of code in source code during compilation that causes it to insert a backdoor in the compiled output. ->A compiler is a specialized computer program that converts source code into machine language so that its instructions can be understood by computers' central processing units

  5. UPLOAD & DOWNLOAD UPLOAD *Uploading is the transmission of a file from one computer system to another, usually larger computer system. *To upload a file is to send it to another computer that is set up to receive it. *People who share images with others on bulletin board services ( BBS ) upload files to the BBS. DOWNLOAD *Transmit a file or program from a central computer to the accountant's computer. The accountant can retrieve information to be used in an application package such as spreadsheet, file information from a subsidiary, or file data or program from an on-line data base. *A Buffer is the temporary storage area holding information.

  6. TEMPLATES TEMPLATE FILE FORMATS*Are those whose file extension indicates that the file type is intended as a starting point from which to create other files. TEMPLATE PROGRAMMING*Templates are a feature of the C++ programming language that allow functions and classes to operate with generic types. This allows a function or class to work on many different data types without being rewritten for each one. *Templates are of great utility to programmers in C++, especially when combined with multiple inheritance and operator overloading. *The C++ Standard Library provides many useful functions within a Framework of connected templates.

  7. TEMPLATES TEMPLATE METAPROGRAMMING *Template metaprogramming is a metaprogramming technique in which  templates are used by a compiler to generate temporary source code, which is merged by the compiler with the rest of the source code and then compiled. *The output of these templates include compile-time constants, data structures, and complete functions. The use of templates can be thought of as  compile-time execution. *The technique is used by a number of languages, the most well-known being C++, but also Curl, D, Eiffel, Haskell, ML and XL.

  8. TEMPLATES TEMPLATE (SOFTWARE ENGINEERING) *The term template, when used in the context of software engineering has various technical specifications, but is generally identified as any processing element that can be combined with a data model and processed by a  template engineer to produce a result document. WEB TEMPLATE *A web template is a tool used to separate content from presentation in web design, and for mass-production of web documents. It is a basic component of a web template system. Web templates can be used to set up any type of website. In its simplest sense, a web template operates similarly to a form letter for use in setting up a website.

  9. TEMPLATES TEMPLATE (WORD PROCESSING) *The term template, when used in the context of word processing software, refers to a sample "fill-in-the-blank" document that can be completed either by hand or through an automated iterative process, such as with a software assistant. Once the template is completed, the user can edit, save and manage the result as an ordinary word processing document. Word processing templates enable the ability to bypass the initial setup and configuration time necessary to create standardized documents such as a resume. They also enable the automatic configuration of the User Interface of the word processing software, with features such as autocompletion, toolbars, thesaurus, and spelling options. Word processing templates are ordinarily included as a regular feature of most word processing software. In addition, users of such software often have the option to create and save their own templates, or to acquire them from the original vendor of the software, or from third parties.

  10. ASISSTANT *Assistantis a software programthatisbundledwithall Apple Macintoshesthatomewith Mac OS X. *TheAssistanthelpstheuser set up thingssuch as AirPortconnections and Bluetooth devices. *AnAssistantactslike a wizard in Microsoft Windows.

  11. GIU GRAPHICAL USER INTERFACE (GIU) *A type of user interface whichallowspeopletointeractwithelectronicdevicessuch as computers; hand-helddevicessuch as MP3 Players, Portable Media PlayersorGamingdevices. *A GUIoffersgraphicalicons, and visual indicators, as opposedtotext-based interfaces, typedcommandlabelsortextnavigationtofullyrepresenttheinformation and actionsavailableto a user. Theactions are usuallyperformedthroughdirectmanipulation of thegraphicalelements.

  12. GIU GRAPHICAL USER INTERFACE (GIU) * A GUI uses a combination of technologies and devices to provide a platform the user can interact with, for the tasks of gathering and producing information. The most common combination in GUIs is the WIMP paradigm, especially in personal computers.

More Related