Published by:
|

A method of gaining access into a system that bypasses the usual authentication steps. Programmers sometimes use these when designing a system to save time accessing them, but they obviously are a major security risk so should not be used in live systems.

Also: known as Backdoor

Share this post

Related Posts

Get in touch

SPEAK WITH AN EXPERT

01423 425 498

Related Posts