A method of gaining access into a system that bypasses the usual authentication steps. Programmers sometimes use these when designing a system to save time accessing them, but they obviously are a major security risk so should not be used in live systems.