back door

(redirected from malicious hardware)
Also found in: Thesaurus, Medical, Financial, Encyclopedia.

back door

n
1. a door at the rear or side of a building
2. a means of entry to a job, position, etc, that is secret, underhand, or obtained through influence
3. (as modifier): a backdoor way of making firms pay more.
Collins English Dictionary – Complete and Unabridged, 12th Edition 2014 © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003, 2006, 2007, 2009, 2011, 2014

back′ door′


n.
a secret, furtive, illicit, or indirect method or means.
[1520–30]
back′door′, adj.
Random House Kernerman Webster's College Dictionary, © 2010 K Dictionaries Ltd. Copyright 2005, 1997, 1991 by Random House, Inc. All rights reserved.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.back door - a secret or underhand means of access (to a place or a position)back door - a secret or underhand means of access (to a place or a position); "he got his job through the back door"
access - the act of approaching or entering; "he gained access to the building"
2.back door - an undocumented way to get access to a computer system or the data it containsback door - an undocumented way to get access to a computer system or the data it contains
access code, access - a code (a series of characters or digits) that must be entered in some way (typed or dialed or spoken) to get the use of something (a telephone line or a computer or a local area network etc.)
3.back door - an entrance at the rear of a buildingback door - an entrance at the rear of a building
exterior door, outside door - a doorway that allows entrance to or exit from a building
Based on WordNet 3.0, Farlex clipart collection. © 2003-2012 Princeton University, Farlex Inc.
Translations
References in periodicals archive ?
Super Micro Computer (SMCI) is telling customers that an outside firm found no evidence of any malicious hardware in its current or older-model motherboards in an investigation, Reuters reports.
A variety of hardware and software approaches can help mitigate these threats, whether they be transmissions as part of an electronic warfare (EW) attack, counterfeit ICs that represent not just intellectual-property theft but can carry malicious hardware Trojans, or attacks on network and web-application firewalls.